-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT External Security Bulletin Redistribution
VMware Workstation and Fusion updates address out-of-bounds
memory access vulnerability VMware Security Advisory
17 March 2017
AusCERT Security Bulletin Summary
Product: VMware Workstation
Operating System: Windows
Impact/Access: Execute Arbitrary Code/Commands -- Existing Account
CVE Names: CVE-2017-4901
- --------------------------BEGIN INCLUDED TEXT--------------------
VMware Workstation and Fusion updates address out-of-bounds memory access
vulnerability VMware Security Advisory
Advisory ID: VMSA-2017-0005
Synopsis: VMware Workstation and Fusion updates address critical out-of-bounds
memory access vulnerability
Issue date: 2017-03-14
Updated on: 2017-03-14 (Initial Advisory)
CVE numbers: CVE-2017-4901
VMware Workstation and Fusion updates address critical out-of-bounds
memory access vulnerability.
2. Relevant Products
VMware Workstation Pro / Player VMware Fusion Pro / Fusion
3. Problem Description
a. VMware Workstation and Fusion out-of-bounds memory access vulnerability
The drag-and-drop (DnD) function in VMware Workstation and Fusion has an
out-of-bounds memory access vulnerability. This may allow a guest to execute
code on the operating system that runs Workstation or Fusion.
Workaround On Workstation Pro and Fusion, the issue cannot be exploited if
both the drag-and-drop function and the copy-and-paste (C&P) function are
disabled. Refer to the Reference section on documentation how to disable these
functions. This workaround is not available on Workstation Player.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the identifier CVE-2017-4901 to this issue.
Column 5 of the following table lists the action required to remediate the
vulnerability in each release, if a solution is available.
VMware Product Running Replace with/ Mitigation/
Product Version on Severity Apply Patch Workaround
========== ========= ======= ========= ============= ==========
Workstation 12.x Any Critical 12.5.4 Disable DnD
Pro and C&P
Workstation 12.x Any Critical 12.5.4 None
Fusion Pro, 8.x Mac OS X Critical 8.5.5 Disable DnD
Fusion and C&P
ESXi Any ESXi N/A Not
Please review the patch/release notes for your product and version and verify
the checksum of your downloaded file.
VMware Workstation Pro 12.5.4 Downloads and Documentation
VMware Workstation Player 12.5.4 Downloads and Documentation
VMware Fusion Pro / Fusion 8.5.5 Downloads and Documentation
Workstation Pro Disabling drag-and-drop and copy-and-paste functionality, page
81 and 82
Fusion Disabling drag-and-drop and copy-and-paste functionality, page 135
6. Change log
2017-03-14 VMSA-2017-0005 Initial security advisory in conjunction with the
release of VMware Workstation Pro/Player 12.5.4 and VMware Fusion Pro, Fusion
8.5.5 on 2017-03-14
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
PGP key at:
VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to firstname.lastname@example.org
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
Australian Computer Emergency Response Team
The University of Queensland
Internet Email: email@example.com
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----