[Security-announce] NEW – VMSA-2017-0021 – VMware ESXi, vCenter Server Appliance, Workstation & Fusion updates address multiple security vulnerabilities

\n\n–===============6279673034388578823==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary=”_000_6D2C213B0777432ABCA1A128245419AAvmwarecom_”

–_000_6D2C213B0777432ABCA1A128245419AAvmwarecom_
Content-Type: text/plain; charset=”iso-8859-1″
Content-Transfer-Encoding: quoted-printable

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

– ————————————————————————-=

VMware Security Advisory

Advisory ID: VMSA-2017-0021
Severity: Important
Synopsis: VMware ESXi, vCenter Server Appliance, Workstation &
Fusion updates address multiple security vulnerabilities
Issue date: 2017-12-19
Updated on: 2017-12-19 (Initial Advisory)
CVE number: CVE-2017-4933, CVE-2017-4940, CVE-2017-4941,CVE-2017-4943

1. Summary

VMware ESXi, vCenter Server Appliance, Workstation & Fusion updates
address multiple security vulnerabilities

2. Relevant Releases

VMware vSphere Hypervisor (ESXi)
VMware vCenter Server Appliance (vCSA)
VMware Workstation Pro / Player (Workstation)
VMware Fusion Pro, Fusion (Fusion)

3. Problem Description

a. ESXi, Workstation, and Fusion stack overflow via authenticated
VNC session

VMware ESXi, Workstation, and Fusion contain a vulnerability that
could allow an authenticated VNC session to cause a stack overflow
via a specific set of VNC packets. Successful exploitation of this
issue could result in remote code execution in a virtual machine via
the authenticated VNC session.

Note: In order for exploitation to be possible in ESXi, VNC must be
manually enabled in a virtual machine’s .vmx configuration file. In
addition, ESXi must be configured to allow VNC traffic through the
built-in firewall.

VMware would like to thank Lilith Wyatt and another member of Cisco
Talos for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifier CVE-2017-4941 to this issue.

Column 5 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

VMware Product Running Replace with/ Mitigation/
Product Version on Severity Apply patch Workaround
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=
=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
ESXi 6.5 Any N/A not affected N/A
ESXi 6.0 Any Important ESXi600-201711101-SG None
ESXi 5.5 Any Important ESXi550-201709101-SG None

Workstation 14.x Any N/A not affected N/A
Workstation 12.x Any Important 12.5.8 None

Fusion 10.x OSX N/A not affected None
Fusion 8.x OSX Important 8.5.9 None

b. ESXi, Workstation, and Fusion heap overflow via authenticated
VNC session

VMware ESXi, Workstation, and Fusion contain a vulnerability that
could allow an authenticated VNC session to cause a heap overflow
via a specific set of VNC packets resulting in heap corruption.
Successful exploitation of this issue could result in remote code
execution in a virtual machine via the authenticated VNC session.

Note: In order for exploitation to be possible in ESXi, VNC must be
manually enabled in a virtual machine’s .vmx configuration file. In
addition, ESXi must be configured to allow VNC traffic through the
built-in firewall.

VMware would like to thank Lilith Wyatt of Cisco Talos for reporting
this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifier CVE-2017-4933 to this issue.

Column 5 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

VMware Product Running Replace with/ Mitigation/
Product Version on Severity Apply patch Workaround
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=
=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
ESXi 6.5 Any Important ESXi650-201710401-BG None
ESXi 6.0 Any N/A not affected N/A
ESXi 5.5 Any N/A not affected N/A

Workstation 14.x Any N/A not affected N/A
Workstation 12.x Any Important 12.5.8 None

Fusion 10.x OSX N/A not affected N/A
Fusion 8.x OSX Important 8.5.9 None

c. ESXi Host Client stored cross-site scripting vulnerability

The ESXi Host Client contains a vulnerability that may allow for
stored cross-site scripting (XSS). An attacker can exploit this
vulnerability by injecting Javascript, which might get executed
when other users access the Host Client.

VMware would like to thank Alain Homewood of Insomnia Security
for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifier CVE-2017-4940 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Severity Apply Patch* Workaround
=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D =3D=
=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D
ESXi 6.5 Any Important ESXi650-201712103-SG None
ESXi 6.0 Any Important ESXi600-201711103-SG None
ESXi 5.5 Any Important ESXi550-201709102-SG None

d. Privilege escalation in vCenter Server Appliance (vCSA)

VMware vCenter Server Appliance (vCSA) contains a local privilege
escalation vulnerability via the ‘showlog’ plugin. Successful
exploitation of this issue could result in a low privileged user
gaining root level privileges over the appliance base OS.

VMware would like to thank Lukasz Plonka for reporting this issue
to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifier CVE-2017-4943 to this issue.

Column 5 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

VMware Product Running Replace with/ Mitigation/
Product Version on Severity Apply Patch Workaround
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=
=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
vCSA 6.5 Linux Important 6.5 U1d None
vCSA 6.0 Linux N/A not affected N/A
vCSA 5.5 Linux N/A not affected N/A

4. Solution
Please review the patch/release notes for your product and
version and verify the checksum of your downloaded file.
ESXi 6.5
————-
Downloads:
https://my.vmware.com/group/vmware/patch
Documentation:
http://kb.vmware.com/kb/2151061
http://kb.vmware.com/kb/51196

ESXi 6.0
————-
Downloads:
https://my.vmware.com/group/vmware/patch
Documentation:
http://kb.vmware.com/kb/2151132
http://kb.vmware.com/kb/2151134

ESXi 5.5
————
Downloads:
https://my.vmware.com/group/vmware/patch
Documentation:
http://kb.vmware.com/kb/2150876
http://kb.vmware.com/kb/2150878

vCSA 6.5 U1d
Downloads and Documentation:

https://my.vmware.com/web/vmware/details?downloadGroup=3DVC65U1D&productId=
=3D61
4&rPId=3D20189

VMware Workstation Pro 12.5.8
Downloads and Documentation:
https://www.vmware.com/go/downloadworkstation
https://www.vmware.com/support/pubs/ws_pubs.html

VMware Workstation Player 12.5.8
Downloads and Documentation:
https://www.vmware.com/go/downloadplayer
https://www.vmware.com/support/pubs/player_pubs.html

VMware Fusion Pro / Fusion 8.5.9
Downloads and Documentation:
https://www.vmware.com/go/downloadfusion
https://www.vmware.com/support/pubs/fusion_pubs.html

5. References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2017-4933
http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2017-4940
http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2017-4941
http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2017-4943

– ———————————————————————–
6. Change log
2017-12-19 VMSA-2017-0021
Initial security advisory in conjunction with the release of vSphere
6.5 patches on 2017-12-19
– ———————————————————————–
7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org

E-mail: security@vmware.com
PGP key at: https://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html

VMware Security & Compliance Blog
https://blogs.vmware.com/security

Twitter

Copyright 2017 VMware Inc. All rights reserved.

—–BEGIN PGP SIGNATURE—–
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFaOVoJDEcm8Vbi9kMRAqcBAJ4hhDuU7KXIns1lZ/seoAYkWVyJzQCfU6fF
dRSmQHDI8hxdtIKycYgsLtI=3D
=3DKyc6
—–END PGP SIGNATURE—–

–_000_6D2C213B0777432ABCA1A128245419AAvmwarecom_
Content-Type: text/html; charset=”iso-8859-1″
Content-ID:
Content-Transfer-Encoding: quoted-printable

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
– ——————————————————————–=
——
                    =
    VMware Security Advisory
 
Advisory ID: VMSA-2017-0021
Severity:    Important
Synopsis:    VMware ESXi, vCenter Server Appliance, Workstat=
ion &
             Fusion updates address=
multiple security vulnerabilities
Issue date:  2017-12-19
Updated on:  2017-12-19 (Initial Advisory)
CVE number:  CVE-2017-4933, CVE-2017-4940, CVE-2017-4941,CVE-2017=
-4943
 
1. Summary
 
   VMware ESXi, vCenter Server Appliance, Workstation & =
Fusion updates
   address multiple security vulnerabilities
 
2. Relevant Releases
 
   VMware vSphere Hypervisor (ESXi)
   VMware vCenter Server Appliance (vCSA)
   VMware Workstation Pro / Player (Workstation) 
   VMware Fusion Pro, Fusion (Fusion)
 
3. Problem Description
 
   a. ESXi, Workstation, and Fusion stack overflow via authe=
nticated
   VNC session
 
   VMware ESXi, Workstation, and Fusion contain a vulnerabil=
ity that
   could allow an authenticated VNC session to cause a stack=
overflow
   via a specific set of VNC packets. Successful exploitatio=
n of this
   issue could result in remote code execution in a virtual =
machine via 
   the authenticated VNC session.
 
   Note: In order for exploitation to be possible in ESXi, V=
NC must be
   manually enabled in a virtual machine’s .vmx configuratio=
n file. In
   addition, ESXi must be configured to allow VNC traffic th=
rough the
   built-in firewall.
 
   VMware would like to thank Lilith Wyatt and another membe=
r of Cisco
   Talos for reporting this issue to us.
 
   The Common Vulnerabilities and Exposures project (cve.mit=
re.org) has
   assigned the identifier CVE-2017-4941 to this issue.
 
   Column 5 of the following table lists the action required=
to
   remediate the vulnerability in each release, if a solutio=
n is
   available.
 
   VMware      Product Running    &=
nbsp;      Replace with/        Mitigati=
on/
   Product     Version on     =
Severity  Apply patch          Workaround

   =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D =
=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D  =3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D        =3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D
   ESXi        6.5     An=
y     N/A       not affected  &nbsp=
;      N/A
   ESXi        6.0     An=
y     Important ESXi600-201711101-SG None
   ESXi        5.5     An=
y     Important ESXi550-201709101-SG None
                    =
                    &nbsp=
;                    

   Workstation 14.x    Any     N/A&=
nbsp;      not affected         N/A=
   Workstation 12.x    Any     Impo=
rtant 12.5.8               None&nbs=
p;   
                    =
                    &nbsp=
;                    &nbs=
p;
   Fusion      10.x    OSX  &n=
bsp;  N/A       not affected      &=
nbsp;  None
   Fusion      8.x     OSX&nbs=
p;    Important 8.5.9            &n=
bsp;   None
 
b. ESXi, Workstation, and Fusion heap overflow via authenticated
   VNC session
 
   VMware ESXi, Workstation, and Fusion contain a vulnerabil=
ity that
   could allow an authenticated VNC session to cause a heap =
overflow
   via a specific set of VNC packets resulting in heap corru=
ption.
   Successful exploitation of this issue could result in rem=
ote code
   execution in a virtual machine via the authenticated VNC =
session.
 
   Note: In order for exploitation to be possible in ESXi, V=
NC must be
   manually enabled in a virtual machine’s .vmx configuratio=
n file. In
   addition, ESXi must be configured to allow VNC traffic th=
rough the
   built-in firewall.
 
   VMware would like to thank Lilith Wyatt of Cisco Talos fo=
r reporting 
   this issue to us.
 
   The Common Vulnerabilities and Exposures project (cve.mit=
re.org) has
   assigned the identifier CVE-2017-4933 to this issue.
 
   Column 5 of the following table lists the action required=
to
   remediate the vulnerability in each release, if a solutio=
n is
   available.
 
   VMware      Product Running    &=
nbsp;      Replace with/        Mitigati=
on/
   Product     Version on     =
Severity  Apply patch          Workaround

   =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D =
=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D  =3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D        =3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D
   ESXi        6.5      A=
ny    Important ESXi650-201710401-BG None
   ESXi        6.0      A=
ny    N/A       not affected    &nb=
sp;    N/A
   ESXi        5.5      A=
ny    N/A       not affected    &nb=
sp;    N/A
                    =
   
   Workstation 14.x     Any    N/A&=
nbsp;      not affected         N/A=
   Workstation 12.x     Any    Impo=
rtant 12.5.8               None&nbs=
p;   
                    =
    
   Fusion      10.x     OSX&nb=
sp;   N/A       not affected      &=
nbsp;  N/A
   Fusion      8.x      OSX&nb=
sp;   Important 8.5.9              =
  None
  
   c. ESXi Host Client stored cross-site scripting vulnerabi=
lity
  
   The ESXi Host Client contains a vulnerability that may al=
low for
   stored cross-site scripting (XSS). An attacker can exploi=
t this
   vulnerability by injecting Javascript, which might get ex=
ecuted
   when other users access the Host Client.
      
   VMware would like to thank Alain Homewood of Insomnia Sec=
urity
   for reporting this issue to us.
  
   The Common Vulnerabilities and Exposures project (cve.mit=
re.org) has 
   assigned the identifier CVE-2017-4940 to this issue.
   Column 4 of the following table lists the action required=
to
   remediate the vulnerability in each release, if a solutio=
n is
   available.
   VMware  Product Running        &=
nbsp;    Replace with/  
   Product Version on       Severity&nbs=
p;   Apply Patch*        Workaround
   =3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=
=3D=3D=3D  =3D=3D=3D=3D=3D=3D=3D=3D   =3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D        =3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D
   ESXi     6.5    Any   =
  Important  ESXi650-201712103-SG None
   ESXi     6.0    Any   =
  Important  ESXi600-201711103-SG None
   ESXi     5.5    Any   =
  Important  ESXi550-201709102-SG None
  
d. Privilege escalation in vCenter Server Appliance (vCSA)
 
   VMware vCenter Server Appliance (vCSA) contains a local p=
rivilege
   escalation vulnerability via the ‘showlog’ plugin. Succes=
sful
   exploitation of this issue could result in a low privileg=
ed user
   gaining root level privileges over the appliance base OS.=
  
   VMware would like to thank Lukasz Plonka for reporting th=
is issue 
   to us.
 
   The Common Vulnerabilities and Exposures project (cve.mit=
re.org) has
   assigned the identifier CVE-2017-4943 to this issue.
 
   Column 5 of the following table lists the action required=
to
   remediate the vulnerability in each release, if a solutio=
n is
   available.
 
   VMware      Product    Running&n=
bsp;           Replace with/     Mi=
tigation/
   Product     Version    on  =
     Severity  Apply Patch       Wo=
rkaround
   =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D  =3D=3D=3D=3D=3D=3D=
=3D=3D=3D  =3D=3D=3D=3D=3D=3D=3D  =3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D    =3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D
   vCSA        6.5      &=
nbsp; Linux    Important 6.5 U1d        &nbsp=
;  None
   vCSA        6.0      &=
nbsp; Linux    N/A       not affected  &=
nbsp;   N/A
   vCSA        5.5      &=
nbsp; Linux    N/A       not affected  &=
nbsp;   N/A
 
  
4. Solution
   Please review the patch/release notes for your product an=
d
   version and verify the checksum of your downloaded file.

   ESXi 6.5 
   ————-
   Downloads: 
   https://my.vmware.com/group/vmware/patch  
   Documentation: 
   http://kb.vmware.com/kb/2151061
   http://kb.vmware.com/kb/51196
  
   ESXi 6.0 
   ————-
   Downloads: 
   https://my.vmware.com/group/vmware/patch   &nbs=
p;
   Documentation: 
   http://kb.vmware.com/kb/2151132
   http://kb.vmware.com/kb/2151134  
   
   ESXi 5.5
   ————
   Downloads: 
   https://my.vmware.com/group/vmware/patch   

   Documentation:
   http://kb.vmware.com/kb/2150876  
   http://kb.vmware.com/kb/2150878 
   
   vCSA 6.5 U1d
   Downloads and Documentation:
  
https://my.vmware.com/web/vmware/details?downloadGroup=3DVC65U1D&p=
roductId=3D61
4&rPId=3D20189
  
   VMware Workstation Pro 12.5.8
   Downloads and Documentation:
   https://www.vmware.com/go/downloadworkstation
   https://www.vmware.com/support/pubs/ws_pubs.html
 
   VMware Workstation Player 12.5.8
   Downloads and Documentation:
   https://www.vmware.com/go/downloadplayer
   https://www.vmware.com/support/pubs/player_pubs.html
  
   VMware Fusion Pro / Fusion 8.5.9
   Downloads and Documentation: 
   https://www.vmware.com/go/downloadfusion 
   https://www.vmware.com/support/pubs/fusion_pubs.html&nbsp=
;              
 
  
5. References
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2017-=
4933
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2017-=
4940
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2017-=
4941
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2017-=
4943
  
– ——————————————————————–=
6. Change log
   2017-12-19 VMSA-2017-0021
   Initial security advisory in conjunction with the release=
of vSphere  
   6.5 patches on 2017-12-19
– ——————————————————————–=
7. Contact
 
   E-mail list for product security notifications and announ=
cements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security=
-announce
 
   This Security Advisory is posted to the following lists:

  
     security-announce@lists.vmware.com
     bugtraq@securityfocus.com
     fulldisclosure@seclists.org
 
   E-mail: security@vmware.com
   PGP key at: https://kb.vmware.com/kb/1055
 
   VMware Security Advisories
   http://www.vmware.com/security/advisories
 
   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response=
.html
 
   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html

  
   VMware Security & Compliance Blog
   https://blogs.vmware.com/security
 
   Twitter
   https://twitter.com/VMwareSRC
 
   Copyright 2017 VMware Inc.  All rights reserved.

—–BEGIN PGP SIGNATURE—–
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8
wj8DBQFaOVoJDEcm8Vbi9kMRAqcBAJ4hhDuU7KXIns1lZ/seoAYkWVyJzQCfU6fF
dRSmQHDI8hxdtIKycYgsLtI=3D
=3DKyc6
—–END PGP SIGNATURE—–

–_000_6D2C213B0777432ABCA1A128245419AAvmwarecom_–

–===============6279673034388578823==
Content-Type: text/plain; charset=”us-ascii”
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Security-announce mailing list
Security-announce@lists.vmware.com
https://lists.vmware.com/mailman/listinfo/security-announce

–===============6279673034388578823==–