-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.1892
            Security vulnerabilities addressed in VMWare ESXi,
          Workstation, Fusion, Remote Console and Horizon Client
                                1 June 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           VMWare ESXi
                   VMWare Workstation
                   VMWare Fusion
                   VMWare Remote Console
                   VMWare Horizon Client
Publisher:         VMWare
Operating System:  Mac OS
                   Windows
                   Virtualisation
Impact/Access:     Increased Privileges -- Existing Account
                   Denial of Service    -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-3959 CVE-2020-3958 CVE-2020-3957

Original Bulletin: 
   https://www.vmware.com/security/advisories/VMSA-2020-0011.html

- --------------------------BEGIN INCLUDED TEXT--------------------

+-----------------------------------------------------------------------------+
|Advisory|VMSA-2020-0011                                                      |
|ID      |                                                                    |
|--------+--------------------------------------------------------------------|
|Advisory|Important                                                           |
|Severity|                                                                    |
|--------+--------------------------------------------------------------------|
|CVSSv3  |3.3-7.3                                                             |
|Range   |                                                                    |
|--------+--------------------------------------------------------------------|
|        |VMware ESXi, Workstation, Fusion, VMware Remote Console and Horizon |
|Synopsis|Client updates address multiple security vulnerabilities            |
|        |(CVE-2020-3957, CVE-2020-3958, CVE-2020-3959)                       |
|--------+--------------------------------------------------------------------|
|Issue   |2020-05-28                                                          |
|Date    |                                                                    |
|--------+--------------------------------------------------------------------|
|Updated |2020-05-28 (Initial Advisory)                                       |
|On      |                                                                    |
|--------+--------------------------------------------------------------------|
|CVE(s)  |CVE-2020-3957, CVE-2020-3958, CVE-2020-3959                         |
+-----------------------------------------------------------------------------+

1. Impacted Products

  * VMware ESXi
  * VMware Workstation Pro / Player (Workstation)
  * VMware Fusion Pro / Fusion (Fusion)
  * VMware Remote Console for Mac (VMRC for Mac)
  * VMware Horizon Client for Mac

2. Introduction

Multiple security vulnerabilities in VMware ESXi, Workstation, Fusion, VMRC and
Horizon Client were privately reported to VMware. Patches and workarounds are
available to remediate or workaround these vulnerabilities in affected VMware
products. 

3a. Service opener - Time-of-check Time-of-use (TOCTOU) issue (CVE-2020-3957)

Description:

VMware Fusion, VMRC and Horizon Client contain a local privilege escalation
vulnerability due to a Time-of-check Time-of-use (TOCTOU) issue in the service
opener. VMware has evaluated the severity of this issue to be in the Important
severity range with a maximum CVSSv3 base score of 7.3.

Known Attack Vectors:

Successful exploitation of this issue may allow attackers with normal user
privileges to escalate their privileges to root on the system where Fusion,
VMRC and Horizon Client are installed.

Resolution:
To remediate CVE-2020-3957 apply the patches listed in the 'Fixed Version'
column of the 'Response Matrix' found below.

Workarounds:

None.

Additional Documentations:

None.

Acknowledgements:

VMware would like to thank Rich Mirch of TeamARES from Critical Start
Inc. and Jeffball of GRIMM for independently reporting this issue to us.

Resolution Matrix:

+-------------------------------------------------------------------------------------+
|Product|Version|Running|CVE          |CVSSV3|Severity |Fixed  |Workarounds|Additional|
|       |       |On     |Identifier   |      |         |Version|           |Documents |
|-------+-------+-------+-------------+------+---------+-------+-----------+----------|
|Fusion |11.x   |OS X   |CVE-2020-3957|7.3   |Important|11.5.5 |None       |None      |
|-------+-------+-------+-------------+------+---------+-------+-----------+----------|
|VMRC   |11.x   |       |             |      |         |Patch  |           |          |
|for Mac|and    |OS X   |CVE-2020-3957|7.3   |Important|Pending|None       |None      |
|       |prior  |       |             |      |         |       |           |          |
|-------+-------+-------+-------------+------+---------+-------+-----------+----------|
|Horizon|5.x and|       |             |      |         |Patch  |           |          |
|Client |prior  |OS X   |CVE-2020-3957|7.3   |Important|Pending|None       |None      |
|for Mac|       |       |             |      |         |       |           |          |
+-------------------------------------------------------------------------------------+

3b. Denial-of-service vulnerability in Shader functionality (CVE-2020-3958)

Description:

VMware ESXi, Workstation and Fusion contain a denial-of-service vulnerability
in the shader functionality. VMware has evaluated the severity of this issue to
be in the Moderate severity range with a maximum CVSSv3 base score of 4.0.

Known Attack Vectors:

Exploitation of this issue require an attacker to have access to a virtual
machine with 3D graphics enabled. It is not enabled by default on ESXi and is
enabled by default on Workstation and Fusion.

Successful exploitation of this issue may allow attackers with
non-administrative access to a virtual machine to crash the virtual machine's
vmx process leading to a denial of service condition.

Resolution:

To remediate CVE-2020-3958 apply the patches listed in the 'Fixed Version'
column of the 'Response Matrix' found below.

Workarounds:

Workarounds for CVE-2020-3958 have been been listed in the 'Workarounds' column
of the 'Response Matrix' below.


Additional Documentations:

None.


Acknowledgements:

VMware would like to thank Piotr Bania of Cisco Talos for reporting this issue
to us.


Notes:

None.


Resolution Matrix:

+-----------------------------------------------------------------------------------------------------+
|Product    |Version|Running|CVE          |CVSSV3|Severity|Fixed Version       |Workarounds|Additional|
|           |       |On     |Identifier   |      |        |                    |           |Documents |
|-----------+-------+-------+-------------+------+--------+--------------------+-----------+----------|
|ESXi       |7.0    |Any    |CVE-2020-3958|N/A   |N/A     |Unaffected          |N/A        |N/A       |
|-----------+-------+-------+-------------+------+--------+--------------------+-----------+----------|
|ESXi       |6.7    |Any    |CVE-2020-3958|4.0   |Moderate|ESXi670-202004101-SG|See Item 34|None      |
|-----------+-------+-------+-------------+------+--------+--------------------+-----------+----------|
|ESXi       |6.5    |Any    |CVE-2020-3958|4.0   |Moderate|ESXi650-202005401-SG|See Item 34|None      |
|-----------+-------+-------+-------------+------+--------+--------------------+-----------+----------|
|Workstation|15.x   |Any    |CVE-2020-3958|4.0   |Moderate|15.5.2              |KB59146    |None      |
|           |       |       |             |      |        |                    |           |          |
|-----------+-------+-------+-------------+------+--------+--------------------+-----------+----------|
|Fusion     |11.x   |OS X   |CVE-2020-3958|4.0   |Moderate|11.5.2              |KB59146    |None      |
+-----------------------------------------------------------------------------------------------------+

3c. Memory leak vulnerability in VMCI module (CVE-2020-3959)

Description:

VMware ESXi, Workstation and Fusion contain a memory leak vulnerability in the
VMCI module. VMware has evaluated the severity of this issue to be in the Low
severity range with a maximum CVSSv3 base score of 3.3.


Known Attack Vectors:

A malicious actor with local non-administrative access to a virtual machine may
be able to crash the virtual machine's vmx process leading to a partial denial
of service.


Resolution:

To remediate CVE-2020-3959 apply the patches listed in the 'Fixed Version'
column of the 'Response Matrix' found below.

Workarounds:

None.

Additional Documentations:

None.

Acknowledgements:

VMware would like to thank Tianwen Tang(VictorV) of Qihoo 360Vulcan Team
working with 360 BugCloud for reporting this issue to us.

Notes:

None.

Resolution Matrix:

+-----------------------------------------------------------------------------------------------------+
|Product    |Version|Running|CVE          |CVSSV3|Severity|Fixed Version       |Workarounds|Additional|
|           |       |On     |Identifier   |      |        |                    |           |Documents |
|-----------+-------+-------+-------------+------+--------+--------------------+-----------+----------|
|ESXi       |7.0    |Any    |CVE-2020-3959|N/A   |N/A     |Unaffected          |N/A        |N/A       |
|-----------+-------+-------+-------------+------+--------+--------------------+-----------+----------|
|ESXi       |6.7    |Any    |CVE-2020-3959|3.3   |Low     |ESXi670-202004101-SG|None       |None      |
|-----------+-------+-------+-------------+------+--------+--------------------+-----------+----------|
|ESXi       |6.5    |Any    |CVE-2020-3959|3.3   |Low     |ESXi650-202005401-SG|None       |None      |
|-----------+-------+-------+-------------+------+--------+--------------------+-----------+----------|
|Workstation|15.x   |Any    |CVE-2020-3959|3.3   |Low     |15.1.0              |None       |None      |
|           |       |       |             |      |        |                    |           |          |
|-----------+-------+-------+-------------+------+--------+--------------------+-----------+----------|
|Fusion     |11.x   |OS X   |CVE-2020-3959|3.3   |Low     |11.1.0              |None       |None      |
+-----------------------------------------------------------------------------------------------------+

4. References

Fixed Version(s) and Release Notes:

VMware ESXi 6.7 ESXi670-202004101-SG
https://my.vmware.com/group/vmware/patch
https://docs.vmware.com/en/VMware-vSphere/6.7/rn/esxi670-202004002.html

VMware ESXi 6.5 ESXi650-202005401-SG
https://my.vmware.com/group/vmware/patch
https://docs.vmware.com/en/VMware-vSphere/6.5/rn/esxi650-202005001.html

VMware Workstation Pro 15.5.2

Downloads and Documentation:

https://www.vmware.com/go/downloadworkstation

https://docs.vmware.com/en/VMware-Workstation-Pro/index.html

VMware Workstation Player 15.5.2

Downloads and Documentation:

https://www.vmware.com/go/downloadplayer
https://docs.vmware.com/en/VMware-Workstation-Player/index.html

VMware Fusion 11.5.5 (Latest)
Downloads and Documentation:
https://www.vmware.com/go/downloadfusion
https://docs.vmware.com/en/VMware-Fusion/index.html

Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3959

FIRST CVSSv3 Calculator:

CVE-2020-3957- https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/
PR:L/UI:N/S:U/C:H/I:H/A:L
CVE-2020-3958- https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/
PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2020-3959 - https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/
PR:L/UI:N/S:U/C:N/I:N/A:L

5. Change log

2020-05-28: VMSA-2020-0011 - Initial security advisory.

6. Contact

E-mail list for product security notifications and announcements: 
https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists: 
  security-announce@lists.vmware.com 
  bugtraq@securityfocus.com 
  fulldisclosure@seclists.org

E-mail: security@vmware.com

PGP key at: 
https://kb.vmware.com/kb/1055

VMware Security Advisories
https://www.vmware.com/security/advisories

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases 
https://www.vmware.com/support/policies/lifecycle.html

VMware Security & Compliance Blog  
https://blogs.vmware.com/security

Twitter 
https://twitter.com/VMwareSRC

Copyright 2020 VMware Inc. All rights reserved.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=wm7V
-----END PGP SIGNATURE-----