Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.0942.2 VMware Security Advisories - VMSA-2020-0005 20 March 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: VMware Workstation Pro / Player (Workstation) VMware Fusion Pro / Fusion (Fusion) VMware Remote Console for Mac (VMRC for Mac) VMware Horizon Client for Mac VMware Horizon Client for Windows Publisher: VMware Operating System: Windows OS X Virtualisation Impact/Access: Denial of Service -- Existing Account Root Compromise -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2020-3951 CVE-2020-3950 Original Bulletin: https://www.vmware.com/security/advisories/VMSA-2020-0005.html Revision History: March 20 2020: Security advisory has been updated with additional instructions found in KB78294 which must be applied after updating to Fusion 11.5.2 to remediate CVE-2020-3950. March 18 2020: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- VMware Security Advisories +--------+--------------------------------------------------------------------+ |Advisory|VMSA-2020-0005.1 | |ID | | +--------+--------------------------------------------------------------------+ |Advisory|Important | |Severity| | +--------+--------------------------------------------------------------------+ |CVSSv3 |3.2-7.3 | |Range | | +--------+--------------------------------------------------------------------+ | |VMware Workstation, Fusion, VMware Remote Console and Horizon Client| |Synopsis|updates address privilege escalation and denial-of-service | | |vulnerabilities (CVE-2020-3950, CVE-2020-3951) | +--------+--------------------------------------------------------------------+ |Issue |2020-03-17 | |Date | | +--------+--------------------------------------------------------------------+ |Updated |2020-03-18 | |On | | +--------+--------------------------------------------------------------------+ |CVE(s) |CVE-2020-3950, CVE-2020-3951 | +--------+--------------------------------------------------------------------+ 1. Impacted Products o VMware Workstation Pro / Player (Workstation) o VMware Fusion Pro / Fusion (Fusion) o VMware Remote Console for Mac (VMRC for Mac) o VMware Horizon Client for Mac o VMware Horizon Client for Windows 2. Introduction VMware Workstation, Fusion, VMware Remote Console and Horizon Client updates address privilege escalation and denial-of-service vulnerabilities. Patches are available to remediate these vulnerabilities in affected VMware products. 3a. Privilege escalation vulnerability via setuid binaries (CVE-2020-3950 ) Description: VMware Fusion, VMRC for Mac and Horizon Client for Mac contain a privilege escalation vulnerability due to improper use of setuid binaries. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.3. Known Attack Vectors: Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed. Resolution: Updated 2020-03-18: To remediate CVE-2020-3950 in VMware Remote Console for Mac (VMRC for Mac) and VMware Horizon Client for Mac, apply the patches listed in the 'Fixed Version' column of the 'Resolution Matrix' found below. To remediate CVE-2020-3950 in VMware Fusion, first apply the patches listed in the 'Fixed Version' column of the 'Resolution Matrix' found below then follow the instructions found in KB78294 listed in the 'Additional Documentation' column of the 'Resolution Matrix'. These instruction are needed because the fix for CVE-2020-3950 in Fusion 11.5.2 was found to be incomplete and addresses the issue partially. Workarounds: None. Additional Documentations: See the 'Resolution Matrix'. Acknowledgements: VMware would like to thank Jeffball of GRIMM and Rich Mirch for independently reporting this issue to us. Resolution Matrix: +-------+-------+-------+-------------+------+---------+-------+-----------+----------+ |Product|Version|Running|CVE |CVSSV3|Severity |Fixed |Workarounds|Additional| | | |On |Identifier | | |Version| |Documents | +-------+-------+-------+-------------+------+---------+-------+-----------+----------+ |Fusion |11.x |OS X |CVE-2020-3950|7.3 |Important|11.5.2*|None |KB78294 | +-------+-------+-------+-------------+------+---------+-------+-----------+----------+ |VMRC |11.x | | | | | | | | |for Mac|and |OS X |CVE-2020-3950|7.3 |Important|11.0.1 |None |None | | |prior | | | | | | | | +-------+-------+-------+-------------+------+---------+-------+-----------+----------+ |Horizon|5.x and| | | | | | | | |Client |prior |OS X |CVE-2020-3950|7.3 |Important|5.4.0 |None |None | |for Mac| | | | | | | | | +-------+-------+-------+-------------+------+---------+-------+-----------+----------+ * Added 2020-03-18: It was discovered that the fix for CVE-2020-3950 released with Fusion 11.5.2 was incomplete. The next release of Fusion will contain a complete fix for CVE-2020-3950 and this advisory will be updated when the new release is available. 3b. Denial of service vulnerability in Cortado Thinprint (CVE-2020-3951) Description: VMware Workstation and Horizon Client for Windows contain a denial-of-service vulnerability due to a heap-overflow issue in Cortado Thinprint. VMware has evaluated the severity of this issue to be in the Low severity range with a maximum CVSSv3 base score of 3.2. Known Attack Vectors: Attackers with non-administrative access to a guest VM with virtual printing enabled may exploit this issue to create a denial-of-service condition of the Thinprint service running on the system where Workstation or Horizon Client is installed. Resolution: To remediate CVE-2020-3951, apply the patches listed in the 'Fixed Version' column of the 'Resolution Matrix' found below. Workarounds: None. Additional Documentations: None. Acknowledgements: VMware would like to thank Dhanesh Kizhakkinan of FireEye Inc. for reporting this issue to us. Notes: Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon Client. Resolution Matrix: +-----------+-------+-------+-------------+------+--------+--------+-----------+----------+ |Product |Version|Running|CVE |CVSSV3|Severity|Fixed |Workarounds|Additional| | | |On |Identifier | | |Version | |Documents | +-----------+-------+-------+-------------+------+--------+--------+-----------+----------+ |Workstation|15.x |Windows|CVE-2020-3951|3.2 |Low |15.5.2 |None |None | | | | | | | | | | | +-----------+-------+-------+-------------+------+--------+--------+-----------+----------+ |Workstation|15.x |Linux |CVE-2020-3951|N/A |N/A |Not |N/A |N/A | | | | | | | |affected| | | +-----------+-------+-------+-------------+------+--------+--------+-----------+----------+ |Horizon |5.x and| | | | | | | | |Client for |prior |Windows|CVE-2020-3951|3.2 |Low |5.4.0 |None |None | |Windows | | | | | | | | | +-----------+-------+-------+-------------+------+--------+--------+-----------+----------+ 4. References Fixed Version(s) and Release Notes: VMware Workstation Pro 15.5.2 Downloads and Documentation: https://www.vmware.com/go/downloadworkstation https://docs.vmware.com/en/VMware-Workstation-Pro/index.html VMware Workstation Player 15.5.2 Downloads and Documentation: https://www.vmware.com/go/downloadplayer https://docs.vmware.com/en/VMware-Workstation-Player/index.html VMware Fusion 11.5.2 Downloads and Documentation: https://www.vmware.com/go/downloadfusion https://docs.vmware.com/en/VMware-Fusion/index.html VMware Horizon Client 5.4.0 Downloads and Documentation: https://my.vmware.com/web/vmware/info/slug/desktop_end_user_computing/ vmware_horizon_clients/5_0 https://docs.vmware.com/en/VMware-Horizon-Client/index.html VMware Remote Console for Windows 11.0.1 Downloads and Documentation: https://my.vmware.com/web/vmware/details?downloadGroup=VMRC1101&productId=742 https://docs.vmware.com/en/VMware-Remote-Console/index.html Mitre CVE Dictionary Links: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3950 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3951 FIRST CVSSv3 Calculator: CVE-2020-3950-https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L /UI:N/S:U/C:H/I:H/A:L CVE-2020-3951-https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L /UI:N/S:C/C:N/I:N/A:L 5. Change log 2020-03-17: VMSA-2020-0005 Initial security advisory in conjunction with the release of VMware Remote Console 11.0.1 and Horizon Client 5.4.0. 2020-03-18: VMSA-2020-0005.1 Updated security advisory with additional instructions found in KB78294 which must be applied after updating to Fusion 11.5.2 to remediate CVE-2020-3950. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXnQ4GWaOgq3Tt24GAQjxVQ/+IsQkn+8Xjc88nYIHQIfq1ErUK16Lt21x IYpn/ClfOGQBiu3hZ5WOSJDisbY9JD9fKn4UjodZWFih+F7y5PPMv6C6N71I0CQt tNsWaR3IJD62eqxiyT7YfflBh1dkQGwAa6v8xoInBLMAHeY9rYXVvZeI6NKtB9Tl qzcXL/iIor7CBjUfval9GW5VUq0De9mN/MKHBN3pXWhUNIKRq4BV1UCseaqmzM1C /SHQ38k7CyoKr9vSyIyQ7dlKj7HBhQ6AMZVC10mLqe1s77XzO+wrhmeulZTsrB3v cdE0UDeb4n3loD32ViizDiejT0//1pJh+SHx9YvCYlIF8Lkl3yN3bcjAWrzED9uN p+u1y6SKQqXOakp8TJji/g7sTQsEj53+WDjULD7a4qr86OvXaQ6t4ExsmICyZARD rQldCxfltNXCYbkBhA3aFr7TJ3MBDvOml5vDDDyRPGYd13aGaJnDzjvO01DKRRlW 7VLFl4TNC7EnRMaRSMo+4sAOcuRepm6pe0cfCok3ncYsg4PgCkTjoLkBfHSxnrQs jYCUrwiVatFpvRxGYtnBEkyN5on/K88Nofp/0k+bWr/B6E6URogCZ9+IQBY7Uon1 9Yv0uITkv7OYiAsTyb45zyK4H8X1oI+Vc/S73UZP0aylAfkFe2Dyss2rrNqCf2Iu HHtWEMfDj7A= =/rmo -----END PGP SIGNATURE-----