Hi All,
VMware ESXi and vCenter Server updates address multiple security vulnerabilities (CVE-2021-21972, CVE-2021-21973, CVE-2021-21974)
Now what I need to do for this , My VC's are running in 6.5 and 6.7 windows based .Below are the vC version detail's with build number.
SO if I want to fix this vulnerabilities what all steps need to take as per below version and build number.
VMware vCenter Server 6.5.0 build-10964411 6.5
VMware vCenter Server 6.5.0 build-10964411 6.5
VMware vCenter Server 6.7.0 build-14368027 6/7/2003
Thank you for your post on VMware Communities.
Pertaining to CVE-2021-21972, CVE-2021-21973, CVE-2021-21974 please refer to the VMware KB for workaround and fixes: https://kb.vmware.com/s/article/82374?lang=en_US
Arun Kumar
Install Upgrade Specialist
"Did you find this helpful? Let us know by completing this survey (takes 1 minute!)"
Ciao
For vcenter 6.7 upgrade it to 6.7 U3l or apply this workaround:
https://kb.vmware.com/s/article/82374
For vcenter 6.5 upgrade it to 6.5 U3n or apply this workaround:
https://kb.vmware.com/s/article/82374
More info in this link
https://www.vmware.com/security/advisories/VMSA-2021-0002.html
Bye Fabio
Hi Fabio,
Thank you for your reply ,
Kindly share me steps to upgrade windows vcenter 6.7 to 6.7 u3i
And kindly share for fixing same vulnerabilities fro esxi 6.5 and share me workaround link.
Thank you in advance.
regards,
Dinesh
3b. ESXi OpenSLP heap-overflow vulnerability (CVE-2021-21974)
The ESXi team has investigated these vulnerabilities and determined that the possibility of exploitation can be removed by performing the steps detailed in the resolution section of this article. This workaround is meant to be a temporary solution only and customers are advised to deploy the patches documented in the aforementioned VMSAs.
Did VMware released any specific patch to fix this vulnerability?
Below is the work around provided KB article provided by VMware .
DO I need to all steps until last 4th step , are ese I need perform until second step of first 2 points .
esxcli system slp stats get
output: slpd off
To remove the workaround perform the following steps:
output: slpd on
Thank you for your post on VMware Communities.
Pertaining to CVE-2021-21972, CVE-2021-21973, CVE-2021-21974 please refer to the VMware KB for workaround and fixes: https://kb.vmware.com/s/article/82374?lang=en_US
Arun Kumar
Install Upgrade Specialist
"Did you find this helpful? Let us know by completing this survey (takes 1 minute!)"
Hi ,
To which patch I need to install my esxi host , below are the ESXI version and build currently in use , What is the best practice to fix this.
VMware ESXi 6.5.0 build-13635690
VMware ESXi 6.5.0 build-15256549
VMware ESXi 6.5.0 build-15177306
VMware ESXi 6.5.0 build-10884925
VMware ESXi 6.5.0 build-10719125
VMware ESXi 6.5.0 build-10175896
VMware ESXi 6.5.0 build-16576891
VMware ESXi 6.5.0 build-4564106
VMware ESXi 6.5.0 build-6765664
VMware ESXi 6.5.0 build-7388607
VMware ESXi 6.5.0 build-8294253
Regards,
Dinesh
mudireddy.d@infosys.com
Hi Arun,
If possible can you call me for 5min.
I have few doubts regarding ESXI workaround task , Getting bit confused while doing workaround task on esxi level.
Regards,
Mudireddy dinesh
+91 6309818644
Thank you for your reply.
Please let me know your concerns here on the VMware Communities.
If you want to discuss on a call, please log a new case with VMware Support.