ESB-2017.3241 - [Win][UNIX/Linux] VMWare products: Multiple vulnerabilities 2017-12-20

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.3241
            Security vulnerabilities patched in VMWare products
                             20 December 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           VMware ESXi
                   VMware vCenter Server Appliance
                   VMware Workstation
                   VMware Fusion
Publisher:         VMWare
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Root Compromise                 -- Existing Account
                   Execute Arbitrary Code/Commands -- Existing Account
                   Cross-site Scripting            -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-4943 CVE-2017-4941 CVE-2017-4940
                   CVE-2017-4933  

Original Bulletin: 
   https://www.vmware.com/security/advisories/VMSA-2017-0021.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------------
                        VMware Security Advisory

Advisory ID: VMSA-2017-0021
Severity:    Important
Synopsis:    VMware ESXi, vCenter Server Appliance, Workstation &
             Fusion updates address multiple security vulnerabilities
Issue date:  2017-12-19
Updated on:  2017-12-19 (Initial Advisory)
CVE number:  CVE-2017-4933, CVE-2017-4940, CVE-2017-4941,CVE-2017-4943

1. Summary

   VMware ESXi, vCenter Server Appliance, Workstation & Fusion updates
   address multiple security vulnerabilities

2. Relevant Releases

   VMware vSphere Hypervisor (ESXi)
   VMware vCenter Server Appliance (vCSA)
   VMware Workstation Pro / Player (Workstation)
   VMware Fusion Pro, Fusion (Fusion)

3. Problem Description

   a. ESXi, Workstation, and Fusion stack overflow via authenticated
   VNC session

   VMware ESXi, Workstation, and Fusion contain a vulnerability that
   could allow an authenticated VNC session to cause a stack overflow
   via a specific set of VNC packets. Successful exploitation of this
   issue could result in remote code execution in a virtual machine via
   the authenticated VNC session.

   Note: In order for exploitation to be possible in ESXi, VNC must be
   manually enabled in a virtual machine's .vmx configuration file. In
   addition, ESXi must be configured to allow VNC traffic through the
   built-in firewall.

   VMware would like to thank Lilith Wyatt and another member of Cisco
   Talos for reporting this issue to us.

   The Common Vulnerabilities and Exposures project (cve.mitre.org) has
   assigned the identifier CVE-2017-4941 to this issue.

   Column 5 of the following table lists the action required to
   remediate the vulnerability in each release, if a solution is
   available.

   VMware      Product Running           Replace with/        Mitigation/
   Product     Version on      Severity  Apply patch          Workaround
   =========== ======= ======= ========  =============        ==========
   ESXi        6.5     Any     N/A       not affected         N/A
   ESXi        6.0     Any     Important ESXi600-201711101-SG None
   ESXi        5.5     Any     Important ESXi550-201709101-SG None

   Workstation 14.x    Any     N/A       not affected         N/A
   Workstation 12.x    Any     Important 12.5.8               None

   Fusion      10.x    OSX     N/A       not affected         None
   Fusion      8.x     OSX     Important 8.5.9                None

b. ESXi, Workstation, and Fusion heap overflow via authenticated
   VNC session

   VMware ESXi, Workstation, and Fusion contain a vulnerability that
   could allow an authenticated VNC session to cause a heap overflow
   via a specific set of VNC packets resulting in heap corruption.
   Successful exploitation of this issue could result in remote code
   execution in a virtual machine via the authenticated VNC session.

   Note: In order for exploitation to be possible in ESXi, VNC must be
   manually enabled in a virtual machine's .vmx configuration file. In
   addition, ESXi must be configured to allow VNC traffic through the
   built-in firewall.

   VMware would like to thank Lilith Wyatt of Cisco Talos for reporting
   this issue to us.

   The Common Vulnerabilities and Exposures project (cve.mitre.org) has
   assigned the identifier CVE-2017-4933 to this issue.

   Column 5 of the following table lists the action required to
   remediate the vulnerability in each release, if a solution is
   available.

   VMware      Product Running           Replace with/        Mitigation/
   Product     Version on      Severity  Apply patch          Workaround
   =========== ======= ======= ========  =============        ==========
   ESXi        6.5      Any    Important ESXi650-201710401-BG None
   ESXi        6.0      Any    N/A       not affected         N/A
   ESXi        5.5      Any    N/A       not affected         N/A

   Workstation 14.x     Any    N/A       not affected         N/A
   Workstation 12.x     Any    Important 12.5.8               None

   Fusion      10.x     OSX    N/A       not affected         N/A
   Fusion      8.x      OSX    Important 8.5.9                None

   c. ESXi Host Client stored cross-site scripting vulnerability

   The ESXi Host Client contains a vulnerability that may allow for
   stored cross-site scripting (XSS). An attacker can exploit this
   vulnerability by injecting Javascript, which might get executed
   when other users access the Host Client.

   VMware would like to thank Alain Homewood of Insomnia Security
   for reporting this issue to us.

   The Common Vulnerabilities and Exposures project (cve.mitre.org) has
   assigned the identifier CVE-2017-4940 to this issue.
   Column 4 of the following table lists the action required to
   remediate the vulnerability in each release, if a solution is
   available.
   VMware  Product Running             Replace with/
   Product Version on       Severity    Apply Patch*        Workaround
   ======= ======= =======  ========   =============        ==========
   ESXi     6.5    Any      Important  ESXi650-201712103-SG None
   ESXi     6.0    Any      Important  ESXi600-201711103-SG None
   ESXi     5.5    Any      Important  ESXi550-201709102-SG None

d. Privilege escalation in vCenter Server Appliance (vCSA)

   VMware vCenter Server Appliance (vCSA) contains a local privilege
   escalation vulnerability via the 'showlog' plugin. Successful
   exploitation of this issue could result in a low privileged user
   gaining root level privileges over the appliance base OS.

   VMware would like to thank Lukasz Plonka for reporting this issue
   to us.

   The Common Vulnerabilities and Exposures project (cve.mitre.org) has
   assigned the identifier CVE-2017-4943 to this issue.

   Column 5 of the following table lists the action required to
   remediate the vulnerability in each release, if a solution is
   available.

   VMware      Product    Running            Replace with/     Mitigation/
   Product     Version    on       Severity  Apply Patch       Workaround
   ==========  =========  =======  ========= ==============    ==========
   vCSA        6.5        Linux    Important 6.5 U1d           None
   vCSA        6.0        Linux    N/A       not affected      N/A
   vCSA        5.5        Linux    N/A       not affected      N/A


4. Solution
   Please review the patch/release notes for your product and
   version and verify the checksum of your downloaded file.
   ESXi 6.5
   -------------
   Downloads:
   https://my.vmware.com/group/vmware/patch
   Documentation:
   http://kb.vmware.com/kb/2151061
   http://kb.vmware.com/kb/51196

   ESXi 6.0
   -------------
   Downloads:
   https://my.vmware.com/group/vmware/patch
   Documentation:
   http://kb.vmware.com/kb/2151132
   http://kb.vmware.com/kb/2151134

   ESXi 5.5
   ------------
   Downloads:
   https://my.vmware.com/group/vmware/patch
   Documentation:
   http://kb.vmware.com/kb/2150876
   http://kb.vmware.com/kb/2150878

   vCSA 6.5 U1d
   Downloads and Documentation:

https://my.vmware.com/web/vmware/details?downloadGroup=VC65U1D&productId=61
4&rPId=20189

   VMware Workstation Pro 12.5.8
   Downloads and Documentation:
   https://www.vmware.com/go/downloadworkstation
   https://www.vmware.com/support/pubs/ws_pubs.html

   VMware Workstation Player 12.5.8
   Downloads and Documentation:
   https://www.vmware.com/go/downloadplayer
   https://www.vmware.com/support/pubs/player_pubs.html

   VMware Fusion Pro / Fusion 8.5.9
   Downloads and Documentation:
   https://www.vmware.com/go/downloadfusion
   https://www.vmware.com/support/pubs/fusion_pubs.html


5. References
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4933
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4940
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4941
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4943

- - -----------------------------------------------------------------------
6. Change log
   2017-12-19 VMSA-2017-0021
   Initial security advisory in conjunction with the release of vSphere
   6.5 patches on 2017-12-19
- - -----------------------------------------------------------------------
7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

     security-announce@lists.vmware.com
     bugtraq@securityfocus.com
     fulldisclosure@seclists.org

   E-mail: security@vmware.com
   PGP key at: https://kb.vmware.com/kb/1055

   VMware Security Advisories
   http://www.vmware.com/security/advisories

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html

   VMware Security & Compliance Blog
   https://blogs.vmware.com/security

   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2017 VMware Inc.  All rights reserved.

- -----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFaOVoJDEcm8Vbi9kMRAqcBAJ4hhDuU7KXIns1lZ/seoAYkWVyJzQCfU6fF
dRSmQHDI8hxdtIKycYgsLtI=
=Kyc6
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=m99S
-----END PGP SIGNATURE-----

« Back to bulletins