FYI... VMSA-2017-0018 - VMSA-2017-0019
VMSA-2017-0018 - VMware Workstation, Fusion and Horizon View Client updates resolve multiple security vulnerabilities
- https://www.vmware.c...-2017-0018.html
2017-11-16
Severity: Critical
Summary: VMware Workstation, Fusion and Horizon View Client updates resolve multiple security vulnerabilities
Relevant Products:
VMware Workstation Pro / Player (Workstation)
VMware Fusion Pro / Fusion (Fusion)
Problem Description:
a. Heap buffer-overflow vulnerability in VMNAT device
VMware Workstation and Fusion contain a heap buffer-overflow vulnerability in VMNAT device. This issue may allow a guest to execute code on the host...
b. Out-of-bounds write via Cortado ThinPrint
VMware Workstation and Horizon View Client contain an out-of-bounds write vulnerability in JPEG2000 parser in the TPView.dll.
On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon View Client.
Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View Client...
c. Multiple out-of-bounds read issues via Cortado ThinPrint
VMware Workstation and Horizon View Client contain multiple out-of-bounds read vulnerabilities in JPEG2000 parser in the TPView.dll. On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon View Client.
Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View...
d. Guest RPC NULL pointer dereference vulnerability
VMware Workstation and Fusion contain a guest RPC NULL pointer dereference vulnerability. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs...
Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware Horizon View Client 4.6.1
Downloads and Documentation:
- https://my.vmware.co...=578&rPId=18817
VMware Workstation Pro 12.5.8
Downloads and Documentation:
- https://www.vmware.c...loadworkstation
- https://www.vmware.c...bs/ws_pubs.html
VMware Workstation Player 12.5.8
Downloads and Documentation:
- https://www.vmware.c.../downloadplayer
- https://www.vmware.c...layer_pubs.html
VMware Fusion Pro / Fusion 8.5.9
Downloads and Documentation:
- https://www.vmware.c.../downloadfusion
- https://www.vmware.c...usion_pubs.html
- https://www.security....com/id/1039835
CVE Reference: CVE-2017-4934, CVE-2017-4935, CVE-2017-4936, CVE-2017-4937, CVE-2017-4938
Nov 17 2017
Fix Available: Yes Vendor Confirmed: Yes
Version(s): Workstation 12.x, Fusion 8.x ...
Impact: A local user on the guest system can cause denial of service conditions on the guest system.
A local user on the guest system can cause denial of service conditions on the host system.
A local user on the guest system can gain elevated privileges on the host system.
Solution: VMware has issued a fix (Fusion 8.5.9, Workstation 12.5.8)...
- https://www.security....com/id/1039836
CVE Reference: CVE-2017-4935, CVE-2017-4936, CVE-2017-4937
Nov 17 2017
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 4.x ...
Impact: A local user on the guest system can cause denial of service conditions on the host system.
A local user on the guest system can gain elevated privileges on the host system.
Solution: VMware has issued a fix (4.6.1)...
___
VMSA-2017-0019 - NSX for vSphere update addresses NSX Edge Cross-Site Scripting (XSS) issue
- https://www.vmware.c...-2017-0019.html
2017-11-16
Severity: Moderate
Summary: NSX for vSphere update addresses NSX Edge Cross-Site Scripting (XSS) issue.
NSX for vSphere update addresses NSX Edge Cross-Site Scripting (XSS) issue.
Relevant Products:
NSX for vSphere
Problem Description:
a. NSX Edge Cross-Site Scripting (XSS) issue.
NSX Edge contains a moderate Cross-Site Scripting (XSS) issue which may lead to information disclosure...
Solution: Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware NSX for vSphere 6.2.9
Downloads:
- https://my.vmware.co...Group=NSXV_629B
Documentation:
- https://docs.vmware....here/index.html
VMware NSX for vSphere 6.3.5
Downloads:
- https://my.vmware.co...dGroup=NSXV_635
Documentation:
- https://docs.vmware....here/index.html
- https://www.security....com/id/1039837
CVE Reference: CVE-2017-4929
Nov 17 2017
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 6.2.x, 6.3.x ...
Impact: A remote user can access the target user's cookies (including authentication cookies), if any, associated with the VMware NSX interface, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution: VMware has issued a fix (NSX for vSphere 6.2.9, 6.3.5)...
Edited by AplusWebMaster, 17 November 2017 - 01:33 PM.