-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.1499
        VMware Workstation, Fusion and Horizon View Client updates
                     address critical security issues
                               10 June 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          VMware Workstation
                  VMware Player
                  VMware Fusion
                  VMware Horizon Client
Publisher:        VMware
Operating System: Windows
                  UNIX variants (UNIX, Linux, OSX)
                  VMware ESX Server
Impact/Access:    Execute Arbitrary Code/Commands -- Existing Account
                  Denial of Service               -- Existing Account
Resolution:       Patch/Upgrade
CVE Names:        CVE-2015-2341 CVE-2015-2340 CVE-2015-2339
                  CVE-2015-2338 CVE-2015-2337 CVE-2015-2336
                  CVE-2012-0897  

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
                   VMware Security Advisory

Advisory ID: VMSA-2015-0004
Synopsis:    VMware Workstation, Fusion and Horizon View Client updates
             address critical security issues
Issue Date:  2015-06-09
Updated on:  2015-06-09 (Initial Advisory)
CVE number:  CVE-2012-0897, CVE-2015-2336, CVE-2015-2337, CVE-2015-2338, 
             CVE-2015-2339, CVE-2015-2340, CVE-2015-2341

1. Summary

   VMware Workstation, Fusion and Horizon View Client updates address 
   critical security issues.
 
2. Relevant Releases

   VMware Workstation prior to version 11.1.1
   VMware Workstation prior to version 10.0.6
   VMware Player prior to version 7.1.1
   VMware Player prior to version 6.0.6
   VMware Fusion prior to version 7.0.1
   VMware Fusion prior to version 6.0.6

   VMware Horizon Client for Windows prior to version 3.4.0
   VMware Horizon Client for Windows prior to version 3.2.1
   VMware Horizon Client for Windows (with local mode) prior to version 
   5.4.1

3. Problem Description 

   a. VMware Workstation and Horizon Client memory manipulation issues

      VMware Workstation and Horizon Client TPView.ddl and TPInt.dll 
      incorrectly handle memory allocation. On Workstation, this may
      allow a guest to execute code or perform a Denial of Service on 
      the Windows OS that runs Workstation. In the case of a Horizon 
      Client, this may allow a View desktop to execute code or perform 
      a Denial of Service on the Windows OS that runs the Horizon Client.

      VMware would like to thank Kostya Kortchinsky of the Google 
      Security Team for reporting these issues to us.

      The Common Vulnerabilities and Exposures project (cve.mitre.org) 
      has assigned the identifiers CVE-2012-0897 and CVE-2015-2336 
      (TPView.dll Code Execution), CVE-2015-2338 and CVE-2015-2339 
      (TPview.dll DoS), CVE-2015-2337 (TPInt.dll Code Execution), and 
      CVE-2015-2340 (TPInt.dll DoS) to these issues.

      Column 4 of the following table lists the action required to 
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware                         Product    Running   Replace with/
      Product                        Version    on        Apply Patch**
      =============                  =======    =======   =================
      VMware Workstation             11.x       Windows   11.1.1
      VMware Workstation             10.x       Windows   10.0.6

      VMware Player                  7.x        Windows   7.1.1
      VMware Player                  6.x        Windows   6.0.6

      VMware Horizon Client for      3.3.x      Windows   3.4.0
      Windows
      VMware Horizon Client for      3.2.x      Windows   3.2.1
      Windows
      VMware Horizon Client for      5.x        Windows   5.4.2
      Windows (with local mode)

   b. VMware Workstation, Player, and Fusion Denial of Service
      vulnerability

      VMware Workstation, Player, and Fusion contain an input 
      validation issue on an RPC command. This issue may allow 
      for a Denial of Service of the Guest Operating System (32-bit) or 
      a Denial of Service of the Host Operating System (64-bit). 

      VMware would like to thank Peter Kamensky from Digital
      Security for reporting this issue to us.

      The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the identifier CVE-2015-2341 to this issue. 

      Column 4 of the following table lists the action required to
      remediate the vulnerability in each release, if a solution is 
      available.

      VMware         Product    Running   Replace with/
      Product        Version    on        Apply Patch
      =============  =======    =======   =================
      Workstation    11.x       any       not affected
      Workstation    10.x       any       10.0.5

      Player         7.x        any       not affected
      Player         6.x        any       6.0.6

      Fusion         7.x        OSX       7.0.1
      Fusion         6.x        OSX       6.0.6

4. Solution

   Please review the patch/release notes for your product and
   version and verify the checksum of your downloaded file.

   VMware Workstation 11.1.1, 10.0.6
   Downloads and Documentation:
   https://www.vmware.com/go/downloadworkstation

   VMware Player 7.1.1, 6.0.6
   Downloads and Documentation:
   https://www.vmware.com/go/downloadplayer

   VMware Fusion 7.0.1, 6.0.6 
   https://www.vmware.com/go/downloadfusion

   VMware Horizon Clients 5.4.2, 3.4.0, and 3.2.1
   Downloads and Documentation:
   https://www.vmware.com/go/viewclients

5. References

   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0897
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2336
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2337
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2338
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2339
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2340
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2341

- - ------------------------------------------------------------------------

6. Change log

   2015-06-09 VMSA-2015-0004 
   Initial security advisory in conjunction with the release of VMware 
   Workstation 11.1.1 and Horizon Client for Windows 3.2.1 on 2015-06-09.

- - ------------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

    security-announce at lists.vmware.com
    bugtraq at securityfocus.com
    fulldisclosure at seclists.org

   E-mail: security at vmware.com
   PGP key at: http://kb.vmware.com/kb/1055

   VMware Security Advisories
   http://www.vmware.com/security/advisories

   Consolidated list of VMware Security Advisories
   http://kb.vmware.com/kb/2078735

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html
 
   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2015 VMware Inc.  All rights reserved.

                                                                           
                                                  

- -----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.2 (Build 15337)
Charset: utf-8

wj8DBQFVdx3oDEcm8Vbi9kMRAngXAKClezVd4z7zQSx7oN2sY/e4xL2yQACfdjgt
xZFTQoodunKFGfkCMqJ13M8=
=z/Tn
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=9ZAa
-----END PGP SIGNATURE-----