–===============3373788007348682195==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary=”_000_SN1PR05MB1902E27962CB73333B338ACFB96D0SN1PR05MB1902namp_”
–_000_SN1PR05MB1902E27962CB73333B338ACFB96D0SN1PR05MB1902namp_
Content-Type: text/plain; charset=”iso-8859-1″
Content-Transfer-Encoding: quoted-printable
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
– ———————————————————————–
VMware Security Advisory
Advisory ID: VMSA-2018-0014
Severity: Important
Synopsis: VMware Horizon Client update addresses a privilege
escalation vulnerability
Issue date: 2018-05-29
Updated on: 2018-05-29 (Initial Advisory)
CVE number: CVE-2018-6964
1. Summary
VMware Horizon Client update addresses a privilege escalation
vulnerability
2. Relevant Products
VMware Horizon Client for Linux (Horizon Client)
3. Problem Description
VMware Horizon Client privilege escalation vulnerability
VMware Horizon Client contains a local privilege escalation
vulnerability due to insecure usage of SUID binary. Successful
exploitation of this issue may allow unprivileged users to escalate
their privileges to root on a Linux machine where Horizon Client is
installed.
VMware would like to thank Nassim Abbaoui, pentester at OVH, for
reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifier CVE-2018-6964 to this issue.
Column 5 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/ Mitigations/
Product Version on Severity Apply patch Workarounds
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=
=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Horizon Client 4.x & prior Linux Important 4.8.0 None
4. Solution
Please review the patch/release notes for your product and version
and verify the checksum of your downloaded file.
VMware Horizon View Client for Linux 4.8.0
Downloads and Documentation:
https://my.vmware.com/en/web/vmware/info/slug/desktop_end_user
_computing/vmware_horizon_clients/4_0
5. References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2018-6964
– – ———————————————————————
6. Change log
2018-05-29 VMSA-2018-0014 Initial security advisory in conjunction
with the release of VMware Horizon Client 4.8.0 on 2018-05-29.
– – ———————————————————————-
7. Contact
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org
E-mail: security@vmware.com
PGP key at: https://kb.vmware.com/kb/1055
VMware Security Advisories
http://www.vmware.com/security/advisories
Consolidated list of VMware Security Advisories
http://kb.vmware.com/kb/2078735
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
VMware Security & Compliance Blog
https://blogs.vmware.com/security
Twitter
Tweets by VMwareSRC
Copyright 2018 VMware Inc. All rights reserved.
—–BEGIN PGP SIGNATURE—–
Version: Encryption Desktop 10.4.1 (Build 490)
Charset: utf-8
wj8DBQFbDZU4DEcm8Vbi9kMRApVDAJ9135GNw3HmkVJaOGMgA+U60chs3QCcDjPH
r24RHQqTULReKtGs53UjVfs=3D
=3DpZt5
—–END PGP SIGNATURE—–
–_000_SN1PR05MB1902E27962CB73333B338ACFB96D0SN1PR05MB1902namp_
Content-Type: text/html; charset=”iso-8859-1″
Content-Transfer-Encoding: quoted-printable
Hash: SHA1
– ———————————————————————–
&nb=
sp; =
VMware Security Advisory
Advisory ID: VMSA-2018-0014
Severity: Important
Synopsis: VMware Horizon Client update addresses a privil=
ege
es=
calation vulnerability  =
;
Issue date: 2018-05-29
Updated on: 2018-05-29 (Initial Advisory)
CVE number: CVE-2018-6964
1. Summary
VMware Horizon Client update addresses a privilege escalation
vulnerability
2. Relevant Products
VMware Horizon Client for Linux (Horizon Client)
3. Problem Description
VMware Horizon Client privilege escalation vulnerability
VMware Horizon Client contains a local privilege escalation
vulnerability due to insecure usage of SUID binary. Successful=
exploitation of this issue may allow unprivileged users to esc=
alate
their privileges to root on a Linux machine where Horizon Clie=
nt is
installed.
VMware would like to thank Nassim Abbaoui, pentester at OVH, f=
or
reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.or=
g) has
assigned the identifier CVE-2018-6964 to this issue.
Column 5 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product =
Running =
Replace with/ Mitigations/
Product Version  =
; on Severity Apply patch W=
orkarounds
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D =3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Horizon Client 4.x & prior Linux Important =
; 4.8.0 None
&nb=
sp;
4. Solution
Please review the patch/release notes for your product and ver=
sion
and verify the checksum of your downloaded file.
VMware Horizon View Client for Linux 4.8.0
Downloads and Documentation:
https://my.vmware.com/en/web/vmware/info/slug/desktop_end_user=
_computing/vmware_horizon_clients/4_0
5. References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2018-6964=
– – ———————————————————————
6. Change log
2018-05-29 VMSA-2018-0014 Initial security advisory in conjunc=
tion
with the release of VMware Horizon Client 4.8.0 on 2018-05-29.=
– – ———————————————————————-
7. Contact
E-mail list for product security notifications and announcemen=
ts:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-anno=
unce
This Security Advisory is posted to the following lists:
security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org
E-mail: security@vmware.com
PGP key at: https://kb.vmware.com/kb/1055
VMware Security Advisories
http://www.vmware.com/security/advisories
Consolidated list of VMware Security Advisories
http://kb.vmware.com/kb/2078735
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html=
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
VMware Security & Compliance Blog
https://blogs.vmware.com/security
Twitter
https://twitter.com/VMwareSRC
Copyright 2018 VMware Inc. All rights reserved.
—–BEGIN PGP SIGNATURE—–
Version: Encryption Desktop 10.4.1 (Build 490)
Charset: utf-8
wj8DBQFbDZU4DEcm8Vbi9kMRApVDAJ9135GNw3HmkVJaOGMgA+U60chs3QCcDjPH
r24RHQqTULReKtGs53UjVfs=3D
=3DpZt5
—–END PGP SIGNATURE—–
–_000_SN1PR05MB1902E27962CB73333B338ACFB96D0SN1PR05MB1902namp_–
–===============3373788007348682195==
Content-Type: text/plain; charset=”us-ascii”
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
Security-announce mailing list
Security-announce@lists.vmware.com
https://lists.vmware.com/mailman/listinfo/security-announce
–===============3373788007348682195==–