Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.1820 VMSA-2015-0005: VMware Workstation, Player and Horizon View Client for Windows updates address a host privilege escalation vulnerability 10 July 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: VMware Workstation VMware Player VMware Horizon View Client Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Increased Privileges -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2015-3650 Original Bulletin: https://www.vmware.com/security/advisories/VMSA-2015-0005.html - --------------------------BEGIN INCLUDED TEXT-------------------- - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2015-0005 Synopsis: VMware Workstation, Player and Horizon View Client for Windows updates address a host privilege escalation vulnerability Issue date: 2015-07-09 Updated on: 2015-07-09 CVE number: CVE-2015-3650 - ------------------------------------------------------------------------ 1. Summary VMware Workstation, Player and Horizon View Client for Windows updates address a host privilege escalation vulnerability. 2. Relevant Releases VMware Workstation for Windows 11.x prior to version 11.1.1 VMware Workstation for Windows 10.x prior to version 10.0.7 VMware Player for Windows 7.x prior to version 7.1.1 VMware Player for Windows 6.x prior to version 6.0.7 VMware Horizon Client for Windows (with Local Mode Option) prior to version 5.4.2 3. Problem Description a. VMware Workstation, Player and Horizon View Client for Windows host privilege escalation vulnerability. VMware Workstation, Player and Horizon View Client for Windows do not set a discretionary access control list (DACL) for one of their processes. This may allow a local attacker to elevate their privileges and execute code in the security context of the affected process. VMware would like to thank Kyriakos Economou of Nettitude for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2015-3650 to this issue. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======= ======= =============== VMware Workstation 11.x Windows 11.1.1 VMware Workstation 10.x Windows 10.0.7 VMware Player 7.x Windows 7.1.1 VMware Player 6.x Windows 6.0.7 VMware Horizon Client for 5.x Windows 5.4.2 Windows (with Local Mode Option) VMware Horizon Client for 3.x any not affected Windows 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. VMware Workstation -------------------------------- https://www.vmware.com/go/downloadworkstation VMware Player -------------------------------- https://www.vmware.com/go/downloadplayer VMware Horizon Clients -------------------------------- https://www.vmware.com/go/viewclients 5. References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3650 - ------------------------------------------------------------------------ 6. Change log 2015-07-09 VMSA-2015-0005 Initial security advisory. - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories Consolidated list of VMware Security Advisories http://kb.vmware.com/kb/2078735 VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2015 VMware Inc. All rights reserved. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVZ8Kr36ZAP0PgtI9AQLqWQ//SpA9U2dIqr5G1PIl6xEkWWNM7YyA2b7r pvikfXlWNzztFeCl606F+t0HO5IE0A/lO7iQT4MgZhqP1GV6cXpw52hfN5Mozi7s HIf6yuig04sMT+WrKNTms8XK1uhZkk7JB4lb1YvzEAN5w/On0Sl7TpBMRZe7vF/4 JZ/MNN1+FnJVE5MX+dFd3rFMGFeS87Uzmp7mJwnZvAl9TX4S2OO011eJaLxsN+Il i/tCOmEFyttsG1PPW29kFDA0Dtr+Ci2tNiGjP3U5KWxm2qOnXmgQCDUBJTdsgQ/U mPD3NIkGG9/w6yVXywDw+ODQjetgjN4w7xoptDBRI0Ef3VH2RucyCAou9zmVjzvY UTqHylhH0kjogLE5eU3kpE7eabQCyEWjzroSzOl6k653LThdxfGmBYpwCJ7WIGyy RkjKZR6EidTki+bFzD5YSCrNbCFz5U8xq66GR/cAT/0OlbH9+DK7tX4Hgwq3V6pj 3sjbP8jz45pmxg4oira3FJ6EmF9RofIMi3GKOW9S7O11gpVlLzja6CRL+gqOTOhv sJIu/84nj0M2aZa++9XgQu7mRC4dtOVCK72wpZZ8cvGjSQuYneASXpZ7YiSNtP91 u2b33HZWR1v2o903Pv0MlrwAG9ofpoZ+ngG3e9DD6Y5OdnZurIAecErM25p2uE11 3/seVHMG9z0= =Wmin -----END PGP SIGNATURE-----