-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2112
  VMSA-2018-0018 VMware Horizon View Agent, VMware ESXi, Workstation, and
              Fusion updates resolve multiple security issues
                               20 July 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           VMware Horizon View Agent
                   VMware ESXi
                   VMware Workstation
                   VMware Fusion
Publisher:         VMWare
Operating System:  Network Appliance
                   Windows
                   Linux variants
                   OS X
Impact/Access:     Denial of Service        -- Existing Account
                   Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-6972 CVE-2018-6971 

Original Bulletin: 
   https://www.vmware.com/security/advisories/VMSA-2018-0018.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
                           VMware Security Advisory

Advisory ID: VMSA-2018-0018
Severity:    Important
Synopsis:    VMware Horizon View Agent, VMware ESXi, Workstation, and
             Fusion updates resolve multiple security issues
Issue date:  2018-07-19
Updated on:  2018-07-19 (Initial Advisory)
CVE number:  CVE-2018-6971, CVE-2018-6972

1. Summary

   VMware Horizon View Agent, VMware ESXi, Workstation, and Fusion updates
   resolve multiple security issues

2. Relevant Products

   VMware Horizon View Agent (View Agent)
   VMware vSphere Hypervisor (ESXi)
   VMware Workstation Pro / Player (Workstation)
   VMware Fusion Pro, Fusion (Fusion)

3. Problem Description

   a. VMware Horizon View Agent local information disclosure vulnerability
   
   VMware Horizon View Agents contain a local information disclosure 
   vulnerability due to insecure logging of credentials in the
   vmmsi.log file when an account other than the currently logged on
   user is specified during installation (including silent
   installations). Successful exploitation of this issue may allow low
   privileged users access to the credentials specified during the
   Horizon View Agent installation.

   The Common Vulnerabilities and Exposures project (cve.mitre.org) has
   assigned the identifier CVE-2018-6971 to this issue.

   Column 5 of the following table lists the action required to 
   remediate the vulnerability in each release, if a solution is 
   available.

   VMware        Product  Running            Replace with/ Mitigations/    
   Product       Version  on       Severity  Apply patch   Workarounds
   ============  =======  ======== ========  ============  ============
   View Agent    7.x.x    Windows  Important 7.5.1*        KB56631

   *The Horizon View Agent 7.5.1 upgrade process will attempt to remove
   vmmsi.log files which may contain installation credentials. This 
   process may not be effective if the temporary windows directory
   (%TEMP%) was changed after installation or if these logs have been
   collected by an external solution such as VMware vRealize Log
   Insight or a similar 3rd party product. Please see KB56631 for
   more details on manual cleanup.

   b. ESXi, Workstation, and Fusion denial-of-service vulnerability

   VMware ESXi, Workstation, and Fusion contain a denial-of-service 
   vulnerability due to NULL pointer dereference issue in RPC handler. 
   Successful exploitation of this issue may allow attackers with 
   normal user privileges to crash their VMs.

   VMware would like to thank Hahna Latonick and Kevin Fujimoto working 
   with Trend Micro's Zero Day Initiative for reporting this issue to 
   us.

   The Common Vulnerabilities and Exposures project (cve.mitre.org) has
   assigned the identifier CVE-2018-6972 to this issue.

   Column 5 of the following table lists the action required to 
   remediate the vulnerability in each release, if a solution is 
   available.

   VMware      Product Running           Replace with/         Mitigation/
   Product     Version on      Severity  Apply patch           Workaround
   =========== ======= ======= ========  =============         ==========
   ESXi        6.7     Any     Moderate  ESXi670-201806401-BG  None
   ESXi        6.5     Any     Moderate  ESXi650-201806401-BG  None
   ESXi        6.0     Any     Moderate  ESXi600-201806401-BG  None
   ESXi        5.5     Any     Moderate  ESXi550-201806401-BG  None

   Workstation 14.x    Any     Moderate  14.1.2                None
   
   Fusion      10.x    OS X    Moderate  10.1.2                None
    
4. Solution

   Please review the patch/release notes for your product and version 
   and verify the checksum of your downloaded file.

   VMware Horizon View Agent 7.5.1
   -------------
   Downloads and Documentation:
   https://my.vmware.com/group/vmware/get-download?downloadGroup=VIEW-751-STD

   ESXi 6.7 
   -------------
   Downloads: 
   https://my.vmware.com/group/vmware/patch  
   Documentation: 
   https://kb.vmware.com/s/article/55920
  
   ESXi 6.5 
   -------------
   Downloads: 
   https://my.vmware.com/group/vmware/patch  
   Documentation: 
   https://kb.vmware.com/s/article/55915
  
   ESXi 6.0 
   -------------
   Downloads: 
   https://my.vmware.com/group/vmware/patch  
   Documentation: 
   https://kb.vmware.com/s/article/55910
  
   ESXi 5.5 
   -------------
   Downloads: 
   https://my.vmware.com/group/vmware/patch  
   Documentation: 
   https://kb.vmware.com/s/article/55905
 
   VMware Workstation Pro 14.1.2
   -------------
   Downloads and Documentation:
   https://www.vmware.com/go/downloadworkstation
   https://docs.vmware.com/en/VMware-Workstation-Pro/index.html
 
   VMware Workstation Player 14.1.2
   -------------
   Downloads and Documentation:
   https://www.vmware.com/go/downloadplayer
   https://docs.vmware.com/en/VMware-Workstation-Player/index.html 
   
   VMware Fusion Pro / Fusion 10.1.2
   -------------
   Downloads and Documentation: 
   https://www.vmware.com/go/downloadfusion 
   https://docs.vmware.com/en/VMware-Fusion/index.html

5. References

   https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6971
   https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6972
   https://kb.vmware.com/s/article/56631

- - --------------------------------------------------------------------------

6. Change log

   2018-07-19 VMSA-2018-0018 Initial security advisory in conjunction 
   with the release of VMware Horizon View Agent 7.5.1 on 2018-07-19.

- - --------------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:
   security-announce@lists.vmware.com
   bugtraq@securityfocus.com
   fulldisclosure@seclists.org

   E-mail: security@vmware.com
   PGP key at: https://kb.vmware.com/kb/1055
   
   VMware Security Advisories
   https://www.vmware.com/security/advisories

   Consolidated list of VMware Security Advisories
   https://kb.vmware.com/kb/2078735

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html
 
   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html

   VMware Security & Compliance Blog 
   https://blogs.vmware.com/security
   
   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2018 VMware Inc.  All rights reserved.

- -----BEGIN PGP SIGNATURE-----

iF0EARECAB0WIQSmJMaUX5+xuU/DnNwMRybxVuL2QwUCW1CwQgAKCRAMRybxVuL2
Q4ZYAKD+PY1NoH86FY9Q2R05CGWn1we4gQCgiw22ZRjr78eJhEZBleN+9vTm7mk=
=JQv5
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=W6nc
-----END PGP SIGNATURE-----