Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.2112 VMSA-2018-0018 VMware Horizon View Agent, VMware ESXi, Workstation, and Fusion updates resolve multiple security issues 20 July 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: VMware Horizon View Agent VMware ESXi VMware Workstation VMware Fusion Publisher: VMWare Operating System: Network Appliance Windows Linux variants OS X Impact/Access: Denial of Service -- Existing Account Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2018-6972 CVE-2018-6971 Original Bulletin: https://www.vmware.com/security/advisories/VMSA-2018-0018.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- VMware Security Advisory Advisory ID: VMSA-2018-0018 Severity: Important Synopsis: VMware Horizon View Agent, VMware ESXi, Workstation, and Fusion updates resolve multiple security issues Issue date: 2018-07-19 Updated on: 2018-07-19 (Initial Advisory) CVE number: CVE-2018-6971, CVE-2018-6972 1. Summary VMware Horizon View Agent, VMware ESXi, Workstation, and Fusion updates resolve multiple security issues 2. Relevant Products VMware Horizon View Agent (View Agent) VMware vSphere Hypervisor (ESXi) VMware Workstation Pro / Player (Workstation) VMware Fusion Pro, Fusion (Fusion) 3. Problem Description a. VMware Horizon View Agent local information disclosure vulnerability VMware Horizon View Agents contain a local information disclosure vulnerability due to insecure logging of credentials in the vmmsi.log file when an account other than the currently logged on user is specified during installation (including silent installations). Successful exploitation of this issue may allow low privileged users access to the credentials specified during the Horizon View Agent installation. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-6971 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigations/ Product Version on Severity Apply patch Workarounds ============ ======= ======== ======== ============ ============ View Agent 7.x.x Windows Important 7.5.1* KB56631 *The Horizon View Agent 7.5.1 upgrade process will attempt to remove vmmsi.log files which may contain installation credentials. This process may not be effective if the temporary windows directory (%TEMP%) was changed after installation or if these logs have been collected by an external solution such as VMware vRealize Log Insight or a similar 3rd party product. Please see KB56631 for more details on manual cleanup. b. ESXi, Workstation, and Fusion denial-of-service vulnerability VMware ESXi, Workstation, and Fusion contain a denial-of-service vulnerability due to NULL pointer dereference issue in RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs. VMware would like to thank Hahna Latonick and Kevin Fujimoto working with Trend Micro's Zero Day Initiative for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-6972 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply patch Workaround =========== ======= ======= ======== ============= ========== ESXi 6.7 Any Moderate ESXi670-201806401-BG None ESXi 6.5 Any Moderate ESXi650-201806401-BG None ESXi 6.0 Any Moderate ESXi600-201806401-BG None ESXi 5.5 Any Moderate ESXi550-201806401-BG None Workstation 14.x Any Moderate 14.1.2 None Fusion 10.x OS X Moderate 10.1.2 None 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. VMware Horizon View Agent 7.5.1 ------------- Downloads and Documentation: https://my.vmware.com/group/vmware/get-download?downloadGroup=VIEW-751-STD ESXi 6.7 ------------- Downloads: https://my.vmware.com/group/vmware/patch Documentation: https://kb.vmware.com/s/article/55920 ESXi 6.5 ------------- Downloads: https://my.vmware.com/group/vmware/patch Documentation: https://kb.vmware.com/s/article/55915 ESXi 6.0 ------------- Downloads: https://my.vmware.com/group/vmware/patch Documentation: https://kb.vmware.com/s/article/55910 ESXi 5.5 ------------- Downloads: https://my.vmware.com/group/vmware/patch Documentation: https://kb.vmware.com/s/article/55905 VMware Workstation Pro 14.1.2 ------------- Downloads and Documentation: https://www.vmware.com/go/downloadworkstation https://docs.vmware.com/en/VMware-Workstation-Pro/index.html VMware Workstation Player 14.1.2 ------------- Downloads and Documentation: https://www.vmware.com/go/downloadplayer https://docs.vmware.com/en/VMware-Workstation-Player/index.html VMware Fusion Pro / Fusion 10.1.2 ------------- Downloads and Documentation: https://www.vmware.com/go/downloadfusion https://docs.vmware.com/en/VMware-Fusion/index.html 5. References https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6971 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6972 https://kb.vmware.com/s/article/56631 - - -------------------------------------------------------------------------- 6. Change log 2018-07-19 VMSA-2018-0018 Initial security advisory in conjunction with the release of VMware Horizon View Agent 7.5.1 on 2018-07-19. - - -------------------------------------------------------------------------- 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce@lists.vmware.com bugtraq@securityfocus.com fulldisclosure@seclists.org E-mail: security@vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories https://www.vmware.com/security/advisories Consolidated list of VMware Security Advisories https://kb.vmware.com/kb/2078735 VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2018 VMware Inc. All rights reserved. - -----BEGIN PGP SIGNATURE----- iF0EARECAB0WIQSmJMaUX5+xuU/DnNwMRybxVuL2QwUCW1CwQgAKCRAMRybxVuL2 Q4ZYAKD+PY1NoH86FY9Q2R05CGWn1we4gQCgiw22ZRjr78eJhEZBleN+9vTm7mk= =JQv5 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW1FJw2aOgq3Tt24GAQi0NxAAljufKq5NuUlyH79rH7bJbZ4wa4WOELBi 2bES0Q6V9RPHhhAycvXd09rXzA0REmthOqM9o/Xj9GNRKW9qB75SImhTcaMbTR19 1Iq8dAA9QAe/KkxQDDiFIbfAU6iBnDgFDcAT62rqXuGZ3n82+wYrM3Xqurmr00je D9YWW258/OiWPEQIXthobwNn9fxptnPQKf1hzRoZrM6O2HilYfJXi4Hh7j+GzGqw od9H8ChrfVm2CyiD9cbKWy7S03i52a7iOITc9fGTRsqNaopOuoZmuOeMp34hoZAQ I0IJ3Uvcp2//w4l9SqHmSIOL/EFkt5gMcx8F5u6frH82bWd/5rnH+VPYAE7R7vNF gbbejEZ0zI8Q763elPV28H8H+SBlzZzD5tYgW0Iwm0ppFLsWADP22uJSmfQ+O+I6 1uERjLeobOh6XSk+EjFXB05VpHkst3adesfZSr2f0GMrBfKE1WTkY0k72RaR/2H6 IIl75rZZ6fmKf2D1tasT0QUno3IPdZHvXhCd+A7i19JipBkvcGi/kog2xdBZrieL ThYdGfXhWXYi6AVfXEuphUF7UZOyXvV7C6RKRFjLtn7Gybr++DcyZVBnTgsIFG96 uUniT2e1K2Xmksy0r8nPVhxfSn54l3jo3m40kAJy2zSxry88lKVb2gxmwVFADc3w BTVwGnV5Bqk= =W6nc -----END PGP SIGNATURE-----