3. Problem Description

a. VMware View Server directory traversal



VMware View contains a critical directory traversal vulnerability that allows an unauthenticated remote attacker to retrieve arbitrary files from affected View Servers. Exploitation of this issue may expose sensitive information stored on the server.

Workarounds

This vulnerability affects both the View Connection Server and the View Security Server; VMware recommends that customers immediately update both servers to a fixed version of View.

Customers who are unable to immediately update their View Servers should consider the following options:



Disable Security Server

Disabling the Security Server will prevent exploitation of this vulnerability over untrusted remote networks. To restore functionality for remote users, allow them to connect to the Connection Server via a VPN.

Disabling the Security Server will prevent exploitation of this vulnerability over untrusted remote networks. To restore functionality for remote users, allow them to connect to the Connection Server via a VPN. Block directory traversal attempts

It may be possible to prevent exploitation of this issue by blocking directory traversal attacks with an intrusion protection system or application layer firewall.

VMware would like to thank the Digital Defense, Inc. (DDI) Vulnerability Research Team (VRT) for reporting this issue to us.The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-5978 to this issue.Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.