Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:32210
HistoryJun 14, 2015 - 12:00 a.m.

NEW VMSA-2015-0004 - VMware Workstation, Fusion and Horizon View Client updates address critical security issues

2015-06-1400:00:00
vulners.com
14

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


               VMware Security Advisory

Advisory ID: VMSA-2015-0004
Synopsis: VMware Workstation, Fusion and Horizon View Client updates
address critical security issues
Issue Date: 2015-06-09
Updated on: 2015-06-09 (Initial Advisory)
CVE number: CVE-2012-0897, CVE-2015-2336, CVE-2015-2337, CVE-2015-2338,
CVE-2015-2339, CVE-2015-2340, CVE-2015-2341

  1. Summary

    VMware Workstation, Fusion and Horizon View Client updates address
    critical security issues.

  2. Relevant Releases

    VMware Workstation prior to version 11.1.1
    VMware Workstation prior to version 10.0.6
    VMware Player prior to version 7.1.1
    VMware Player prior to version 6.0.6
    VMware Fusion prior to version 7.0.1
    VMware Fusion prior to version 6.0.6

    VMware Horizon Client for Windows prior to version 3.4.0
    VMware Horizon Client for Windows prior to version 3.2.1
    VMware Horizon Client for Windows (with local mode) prior to version
    5.4.1

  3. Problem Description

    a. VMware Workstation and Horizon Client memory manipulation issues

    VMware Workstation and Horizon Client TPView.ddl and TPInt.dll
    incorrectly handle memory allocation. On Workstation, this may
    allow a guest to execute code or perform a Denial of Service on
    the Windows OS that runs Workstation. In the case of a Horizon
    Client, this may allow a View desktop to execute code or perform
    a Denial of Service on the Windows OS that runs the Horizon Client.

    VMware would like to thank Kostya Kortchinsky of the Google
    Security Team for reporting these issues to us.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the identifiers CVE-2012-0897 and CVE-2015-2336
    (TPView.dll Code Execution), CVE-2015-2338 and CVE-2015-2339
    (TPview.dll DoS), CVE-2015-2337 (TPInt.dll Code Execution), and
    CVE-2015-2340 (TPInt.dll DoS) to these issues.

    Column 4 of the following table lists the action required to
    remediate the vulnerability in each release, if a solution is
    available.

    VMware Product Running Replace with/
    Product Version on Apply Patch**
    ============= ======= ======= =================
    VMware Workstation 11.x Windows 11.1.1
    VMware Workstation 10.x Windows 10.0.6

    VMware Player 7.x Windows 7.1.1
    VMware Player 6.x Windows 6.0.6

    VMware Horizon Client for 3.3.x Windows 3.4.0
    Windows
    VMware Horizon Client for 3.2.x Windows 3.2.1
    Windows
    VMware Horizon Client for 5.x Windows 5.4.2
    Windows (with local mode)

    b. VMware Workstation, Player, and Fusion Denial of Service
    vulnerability

    VMware Workstation, Player, and Fusion contain an input
    validation issue on an RPC command. This issue may allow
    for a Denial of Service of the Guest Operating System (32-bit) or
    a Denial of Service of the Host Operating System (64-bit).

    VMware would like to thank Peter Kamensky from Digital
    Security for reporting this issue to us.

    The Common Vulnerabilities and Exposures project (cve.mitre.org)
    has assigned the identifier CVE-2015-2341 to this issue.

    Column 4 of the following table lists the action required to
    remediate the vulnerability in each release, if a solution is
    available.

    VMware Product Running Replace with/
    Product Version on Apply Patch
    ============= ======= ======= =================
    Workstation 11.x any not affected
    Workstation 10.x any 10.0.5

    Player 7.x any not affected
    Player 6.x any 6.0.6

    Fusion 7.x OSX 7.0.1
    Fusion 6.x OSX 6.0.6

  4. Solution

    Please review the patch/release notes for your product and
    version and verify the checksum of your downloaded file.

    VMware Workstation 11.1.1, 10.0.6
    Downloads and Documentation:
    https://www.vmware.com/go/downloadworkstation

    VMware Player 7.1.1, 6.0.6
    Downloads and Documentation:
    https://www.vmware.com/go/downloadplayer

    VMware Fusion 7.0.1, 6.0.6
    https://www.vmware.com/go/downloadfusion

    VMware Horizon Clients 5.4.2, 3.4.0, and 3.2.1
    Downloads and Documentation:
    https://www.vmware.com/go/viewclients

  5. References

    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0897
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2336
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2337
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2338
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2339
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2340
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2341


  1. Change log

    2015-06-09 VMSA-2015-0004
    Initial security advisory in conjunction with the release of VMware
    Workstation 11.1.1 and Horizon Client for Windows 3.2.1 on 2015-06-09.


  1. Contact

    E-mail list for product security notifications and announcements:
    http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

    This Security Advisory is posted to the following lists:

    security-announce at lists.vmware.com
    bugtraq at securityfocus.com
    fulldisclosure at seclists.org

    E-mail: security at vmware.com
    PGP key at: http://kb.vmware.com/kb/1055

    VMware Security Advisories
    http://www.vmware.com/security/advisories

    Consolidated list of VMware Security Advisories
    http://kb.vmware.com/kb/2078735

    VMware Security Response Policy
    https://www.vmware.com/support/policies/security_response.html

    VMware Lifecycle Support Phases
    https://www.vmware.com/support/policies/lifecycle.html

    Twitter
    https://twitter.com/VMwareSRC

    Copyright 2015 VMware Inc. All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.2 (Build 15337)
Charset: utf-8

wj8DBQFVdx3oDEcm8Vbi9kMRAngXAKClezVd4z7zQSx7oN2sY/e4xL2yQACfdjgt
xZFTQoodunKFGfkCMqJ13M8=
=z/Tn
-----END PGP SIGNATURE-----

Related for SECURITYVULNS:DOC:32210