Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.0862 VMware Horizon update addresses Connection Server information disclosure vulnerability 19 March 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: VMware Horizon Publisher: VMWare Operating System: Windows Impact/Access: Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-5513 Original Bulletin: https://www.vmware.com/security/advisories/VMSA-2019-0003.html - --------------------------BEGIN INCLUDED TEXT-------------------- VMSA-2019-0003 VMware Horizon update addresses Connection Server information disclosure vulnerability VMware Security Advisory Advisory ID: VMSA-2019-0003 VMware Security Advisory Severity: Moderate VMware Security Advisory Synopsis: VMware Horizon update addresses Connection Server information disclosure vulnerability VMware Security Advisory Issue date: 2019-03-14 VMware Security Advisory Updated on: 2019-03-14 (Initial Advisory) VMware Security Advisory CVE numbers: CVE-2019-5513 1. Summary VMware Horizon update addresses Connection Server information disclosure vulnerability 2. Relevant Products o VMware Horizon 3. Problem Description Connection Server Information disclosure vulnerability The VMware Horizon Connection Server contains an information disclosure vulnerability. Successful exploitation of this issue may allow disclosure of internal domain names, the Connection Server's internal name, or the gateway's internal IP address. VMware would like to thank Cory Mathews of Critical Start and HD Moore of Atredis Partners for independently reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2019-5513 to this issue. VMware Product Horizon 7 (CR)* Product Version 7.x Running on Windows Severity Moderate Replace with/ Apply Patch 7.8+KB67424- Mitigation/ Workaround None VMware Product Horizon 7 (ESB)* Product Version 7.5.x Running on Windows Severity Moderate Replace with/ Apply Patch 7.5.2+KB67401+ Mitigation/ Workaround None VMware Product Horizon 6 Product Version 6.x Running on Windows Severity Moderate Replace with/ Apply Patch 6.2.8+KB67401+ Mitigation/ Workaround None * See KB52845 for information relating to Horizon 7 Extended Service Branches (ESB) and Current Releases (CR). - - KB67424 details how to configure Horizon Connection Server version 7.8 Domain settings to work with Horizon Clients earlier than version 5.0. + KB67401 details how to enable new user authentication security features in Horizon 7 Version 7.5.2 and Horizon 6 version 6.2.8. 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. VMware Horizon 7 version 7.8 Downloads and Documentation: https://my.vmware.com/en/web/vmware/info/slug/desktop_end_user_computing/ vmware_horizon/7_8 VMware Horizon 7 version 7.5.2 Downloads and Documentation: https://my.vmware.com/en/web/vmware/info/slug/desktop_end_user_computing/ vmware_horizon/7_5 VMware Horizon 6 version 6.2.8 Downloads and Documentation: https://my.vmware.com/group/vmware/info-slug=desktop_end_user_computing/ vmware_horizon/6_2 5. References https://cve.mitre.org/cgi-bin/cvename.cgi-name=CVE-2019-5513 https://kb.vmware.com/s/article/52845 https://kb.vmware.com/s/article/67424 https://kb.vmware.com/s/article/67401 6. Change log 2019-03-14: VMSA-2019-0003 Initial security advisory in conjunction with the release of VMware Horizon 7.8 on 2019-03-14. 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXJA0pWaOgq3Tt24GAQjYOA/9HVVaaq4nC1gNkwKyqKPZsfQuAOnYyVcg LkoLDhu6eE7DJHICw4H6tBTphpbfzP5Ml7sXwa/kYWKobnG9QHduAQX0U8J2zP0F jlaC5kriI/fFLzZGPwZTChwGwWYwaITC/0u6M3uvrPRXRl8l8Wp/SQu9n+AHO1Zf aANdoZmAVBuZIedjNei0OYYNlpsZoF6UlU5OKSQ+TX+6Xd9lpF0vkG4iwflZVzPM lrWWiAQtOEzPsVGPu4oHvc1wW6qrsj77/knKYAN8CTNGBf4xngeat53Yf/uKoWko R5a3XpGxA4baEnUgC1RO4+upjnVwAHYWkXBsVGhbAm90UEqMNc1n48DkU6QriQei zfajyp6pisZp2SlgD5X0XnGd/DEiSgJnPokGAYG48WIz3fv86RRLiOiIjqwhkwaT VRs8ZiJ51VLHLSQC7OjvREkI1MocYerPTfdp9b61/hj9EOaIRiDi11eHlAGjoWpY zpDQL2XbA6bCJuHsHkabr4aOF2NyhYfYmzmJgTiU/JLl/mqeIX6QkpOgNRlTgeKR 0mbasuelW40bcqKUZohCUptwBWMgSLcbbGJy+//NG6PON87vk4BIS/5+nfLcQZVN bQp5DfvVv580pgyTQFizfO4SODm9nwDAOZgEnLMzfbbzsMAShJAoVlkm8WqR3yTD +2DJXUE6nKA= =aUdE -----END PGP SIGNATURE-----