Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.1499 VMware Workstation, Fusion and Horizon View Client updates address critical security issues 10 June 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: VMware Workstation VMware Player VMware Fusion VMware Horizon Client Publisher: VMware Operating System: Windows UNIX variants (UNIX, Linux, OSX) VMware ESX Server Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Denial of Service -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2015-2341 CVE-2015-2340 CVE-2015-2339 CVE-2015-2338 CVE-2015-2337 CVE-2015-2336 CVE-2012-0897 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2015-0004 Synopsis: VMware Workstation, Fusion and Horizon View Client updates address critical security issues Issue Date: 2015-06-09 Updated on: 2015-06-09 (Initial Advisory) CVE number: CVE-2012-0897, CVE-2015-2336, CVE-2015-2337, CVE-2015-2338, CVE-2015-2339, CVE-2015-2340, CVE-2015-2341 1. Summary VMware Workstation, Fusion and Horizon View Client updates address critical security issues. 2. Relevant Releases VMware Workstation prior to version 11.1.1 VMware Workstation prior to version 10.0.6 VMware Player prior to version 7.1.1 VMware Player prior to version 6.0.6 VMware Fusion prior to version 7.0.1 VMware Fusion prior to version 6.0.6 VMware Horizon Client for Windows prior to version 3.4.0 VMware Horizon Client for Windows prior to version 3.2.1 VMware Horizon Client for Windows (with local mode) prior to version 5.4.1 3. Problem Description a. VMware Workstation and Horizon Client memory manipulation issues VMware Workstation and Horizon Client TPView.ddl and TPInt.dll incorrectly handle memory allocation. On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon Client. VMware would like to thank Kostya Kortchinsky of the Google Security Team for reporting these issues to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2012-0897 and CVE-2015-2336 (TPView.dll Code Execution), CVE-2015-2338 and CVE-2015-2339 (TPview.dll DoS), CVE-2015-2337 (TPInt.dll Code Execution), and CVE-2015-2340 (TPInt.dll DoS) to these issues. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch** ============= ======= ======= ================= VMware Workstation 11.x Windows 11.1.1 VMware Workstation 10.x Windows 10.0.6 VMware Player 7.x Windows 7.1.1 VMware Player 6.x Windows 6.0.6 VMware Horizon Client for 3.3.x Windows 3.4.0 Windows VMware Horizon Client for 3.2.x Windows 3.2.1 Windows VMware Horizon Client for 5.x Windows 5.4.2 Windows (with local mode) b. VMware Workstation, Player, and Fusion Denial of Service vulnerability VMware Workstation, Player, and Fusion contain an input validation issue on an RPC command. This issue may allow for a Denial of Service of the Guest Operating System (32-bit) or a Denial of Service of the Host Operating System (64-bit). VMware would like to thank Peter Kamensky from Digital Security for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2015-2341 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= ================= Workstation 11.x any not affected Workstation 10.x any 10.0.5 Player 7.x any not affected Player 6.x any 6.0.6 Fusion 7.x OSX 7.0.1 Fusion 6.x OSX 6.0.6 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. VMware Workstation 11.1.1, 10.0.6 Downloads and Documentation: https://www.vmware.com/go/downloadworkstation VMware Player 7.1.1, 6.0.6 Downloads and Documentation: https://www.vmware.com/go/downloadplayer VMware Fusion 7.0.1, 6.0.6 https://www.vmware.com/go/downloadfusion VMware Horizon Clients 5.4.2, 3.4.0, and 3.2.1 Downloads and Documentation: https://www.vmware.com/go/viewclients 5. References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0897 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2336 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2337 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2338 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2339 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2340 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2341 - - ------------------------------------------------------------------------ 6. Change log 2015-06-09 VMSA-2015-0004 Initial security advisory in conjunction with the release of VMware Workstation 11.1.1 and Horizon Client for Windows 3.2.1 on 2015-06-09. - - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories Consolidated list of VMware Security Advisories http://kb.vmware.com/kb/2078735 VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2015 VMware Inc. All rights reserved. - -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.3.2 (Build 15337) Charset: utf-8 wj8DBQFVdx3oDEcm8Vbi9kMRAngXAKClezVd4z7zQSx7oN2sY/e4xL2yQACfdjgt xZFTQoodunKFGfkCMqJ13M8= =z/Tn - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVXeRnBLndAQH1ShLAQJklBAAi/aeF9HRFddPIgqxxeailwOMVxFa+rx1 8V7reg54AbFuvj/n0N9gpMNAGya4lGHe9bKvF+9XhwOPu71pUpS6fgDvxzINnrXj YwXAKhxQGVDEjjG8hEIXQHhZLgNCDLlfdJCFFlDpy28LiKHCli4gr9lYL6IfUAOK /FY5TONOW8EdH0DaYmoeSWksvF43TDExH+pxEpUM+RO8fO7OokUtSqd+P95D23xQ Gwc2627dbDF6KV4ciw65Zgo8Ku89k53Jk3FRCUNgnigqCaPK5Et0VFHT1E5ZSx6f 6Yaq7eM8zESh4fS9/Hfza0+EGOuKjbkPVvto8wbOjzKk8ZSwdLvEkAjeNQ+DVNYB cWC7LohqT4Ii12SZrCUJ8BCp1ICZpUWRnXYvnFQ7ZhWYk6kpwX0AtrRpfMeoyhJd gYPiVP+pkfbknv+F0obioiMGHOxOUaivZ4axOvxkscsp4/R0ZZNr7sHv2zG9heEG NRsxFtMv4p4mnGlSFVmM4/whkPam/amOGav7DfZA/MJta0OAjHHejkd7VJ5QMywF +Q0TGdzcu7X1L4kcNLRVk62+YfyQrc9yjUHbw07VJOeIlbWnUoEQIXgjySBYi53b gJTSpTgHdGHU69mJftYN9hu7R3gpPdGJXLdlIXcoxNflTE0tkQrRf7KqeKf/YwJG 6HGvJApE+WU= =9ZAa -----END PGP SIGNATURE-----