[Security-announce] New VMSA-2018-0014 – VMware Horizon Client update addresses a privilege escalation vulnerability


–===============3373788007348682195==
Content-Language: en-US
Content-Type: multipart/alternative;
boundary=”_000_SN1PR05MB1902E27962CB73333B338ACFB96D0SN1PR05MB1902namp_”

–_000_SN1PR05MB1902E27962CB73333B338ACFB96D0SN1PR05MB1902namp_
Content-Type: text/plain; charset=”iso-8859-1″
Content-Transfer-Encoding: quoted-printable

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

– ———————————————————————–
VMware Security Advisory

Advisory ID: VMSA-2018-0014
Severity: Important
Synopsis: VMware Horizon Client update addresses a privilege
escalation vulnerability
Issue date: 2018-05-29
Updated on: 2018-05-29 (Initial Advisory)
CVE number: CVE-2018-6964

1. Summary

VMware Horizon Client update addresses a privilege escalation
vulnerability

2. Relevant Products

VMware Horizon Client for Linux (Horizon Client)

3. Problem Description

VMware Horizon Client privilege escalation vulnerability

VMware Horizon Client contains a local privilege escalation
vulnerability due to insecure usage of SUID binary. Successful
exploitation of this issue may allow unprivileged users to escalate
their privileges to root on a Linux machine where Horizon Client is
installed.

VMware would like to thank Nassim Abbaoui, pentester at OVH, for
reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifier CVE-2018-6964 to this issue.

Column 5 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

VMware Product Running Replace with/ Mitigations/
Product Version on Severity Apply patch Workarounds
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=
=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Horizon Client 4.x & prior Linux Important 4.8.0 None

4. Solution

Please review the patch/release notes for your product and version
and verify the checksum of your downloaded file.

VMware Horizon View Client for Linux 4.8.0
Downloads and Documentation:
https://my.vmware.com/en/web/vmware/info/slug/desktop_end_user
_computing/vmware_horizon_clients/4_0

5. References

https://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2018-6964

– – ———————————————————————

6. Change log

2018-05-29 VMSA-2018-0014 Initial security advisory in conjunction
with the release of VMware Horizon Client 4.8.0 on 2018-05-29.

– – ———————————————————————-

7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:
security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org

E-mail: security@vmware.com
PGP key at: https://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

Consolidated list of VMware Security Advisories
http://kb.vmware.com/kb/2078735

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html

VMware Security & Compliance Blog
https://blogs.vmware.com/security

Twitter

Copyright 2018 VMware Inc. All rights reserved.

—–BEGIN PGP SIGNATURE—–
Version: Encryption Desktop 10.4.1 (Build 490)
Charset: utf-8

wj8DBQFbDZU4DEcm8Vbi9kMRApVDAJ9135GNw3HmkVJaOGMgA+U60chs3QCcDjPH
r24RHQqTULReKtGs53UjVfs=3D
=3DpZt5
—–END PGP SIGNATURE—–

–_000_SN1PR05MB1902E27962CB73333B338ACFB96D0SN1PR05MB1902namp_
Content-Type: text/html; charset=”iso-8859-1″
Content-Transfer-Encoding: quoted-printable

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

– ———————————————————————–
            &nb=
sp;            =
  VMware Security Advisory

Advisory ID: VMSA-2018-0014
Severity:    Important
Synopsis:    VMware Horizon Client update addresses a privil=
ege
             es=
calation vulnerability        &nbsp=
;   
Issue date:  2018-05-29
Updated on:  2018-05-29 (Initial Advisory)
CVE number:  CVE-2018-6964

1. Summary

   VMware Horizon Client update addresses a privilege escalation
vulnerability

2. Relevant Products

   VMware Horizon Client for Linux (Horizon Client)

3. Problem Description

   VMware Horizon Client privilege escalation vulnerability
   
   VMware Horizon Client contains a local privilege escalation
   vulnerability due to insecure usage of SUID binary. Successful=

   exploitation of this issue may allow unprivileged users to esc=
alate
   their privileges to root on a Linux machine where Horizon Clie=
nt is
   installed.
   
   VMware would like to thank Nassim Abbaoui, pentester at OVH, f=
or
   reporting this issue to us.

   The Common Vulnerabilities and Exposures project (cve.mitre.or=
g) has
   assigned the identifier CVE-2018-6964 to this issue.

   Column 5 of the following table lists the action required to
   remediate the vulnerability in each release, if a solution is
   available.

   VMware       Product  =
   Running          =
Replace with/ Mitigations/   
   Product      Version  &nbsp=
;  on      Severity Apply patch   W=
orkarounds
   =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D  =3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=3D=3D=3D =3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D  =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Horizon Client 4.x & prior   Linux   Important&nbsp=
;  4.8.0         None
            &nb=
sp;      
    
4. Solution

   Please review the patch/release notes for your product and ver=
sion
   and verify the checksum of your downloaded file.

   VMware Horizon View Client for Linux 4.8.0
   Downloads and Documentation:
   https://my.vmware.com/en/web/vmware/info/slug/desktop_end_user=

   _computing/vmware_horizon_clients/4_0
      

5. References

   https://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2018-6964=

– – ———————————————————————

6. Change log

   2018-05-29 VMSA-2018-0014 Initial security advisory in conjunc=
tion
   with the release of VMware Horizon Client 4.8.0 on 2018-05-29.=

– – ———————————————————————-

7. Contact

   E-mail list for product security notifications and announcemen=
ts:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-anno=
unce

   This Security Advisory is posted to the following lists:
   security-announce@lists.vmware.com
   bugtraq@securityfocus.com
   fulldisclosure@seclists.org

   E-mail: security@vmware.com
   PGP key at: https://kb.vmware.com/kb/1055
   
   VMware Security Advisories
   http://www.vmware.com/security/advisories

   Consolidated list of VMware Security Advisories
   http://kb.vmware.com/kb/2078735

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html=

 
   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html

   VMware Security & Compliance Blog
   https://blogs.vmware.com/security
   
   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2018 VMware Inc.  All rights reserved.

—–BEGIN PGP SIGNATURE—–
Version: Encryption Desktop 10.4.1 (Build 490)
Charset: utf-8

wj8DBQFbDZU4DEcm8Vbi9kMRApVDAJ9135GNw3HmkVJaOGMgA+U60chs3QCcDjPH
r24RHQqTULReKtGs53UjVfs=3D
=3DpZt5
—–END PGP SIGNATURE—–

–_000_SN1PR05MB1902E27962CB73333B338ACFB96D0SN1PR05MB1902namp_–

–===============3373788007348682195==
Content-Type: text/plain; charset=”us-ascii”
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Security-announce mailing list
Security-announce@lists.vmware.com
https://lists.vmware.com/mailman/listinfo/security-announce

–===============3373788007348682195==–