-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.4499
VMware Products affected by denial of service vulnerability (CVE-2020-3999)
                             18 December 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           VMWare Products
Publisher:         VMWare
Operating System:  VMware ESX Server
                   Virtualisation
                   Windows
                   Mac OS
Impact/Access:     Denial of Service -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-3999  

Original Bulletin: 
   https://www.vmware.com/security/advisories/VMSA-2020-0029.html

- --------------------------BEGIN INCLUDED TEXT--------------------

Advisory ID: VMSA-2020-0029

CVSSv3 Range: 3.3

Issue Date: 2020-12-17
Updated On: 2020-12-17 (Initial Advisory)

CVE(s): CVE-2020-3999

Synopsis: VMware ESXi, Workstation, Fusion and Cloud Foundation updates address
a denial of service vulnerability (CVE-2020-3999)

1. Impacted Products

  o VMware ESXi
  o VMware Workstation
  o VMware Fusion
  o VMware Cloud Foundation

2. Introduction

A denial of service vulnerability in VMware ESXi, Workstation and Fusion was
privately reported to VMware. Updates are available to address this
vulnerability in affected VMware products.

3a. Denial-of-Service Vulnerability due to improper input validation
(CVE-2020-3999)

Description

VMware ESXi, Workstation and Fusion contain a denial of service vulnerability
due to improper input validation in GuestInfo. VMware has evaluated the
severity of this issue to be in the Low severity range with a maximum CVSSv3
base score of 3.3.

Known Attack Vectors

A malicious actor with normal user privilege access to a virtual machine can
crash the virtual machine's vmx process leading to a denial of service
condition.

Resolution

To remediate CVE-2020-3999 apply the patches listed in the 'Fixed Version'
column of the 'Response Matrix' found below. 

Workarounds

None.

Additional Documentation

None.

Notes

None.

Acknowledgements

VMware would like to thank Lucas Leong (@_wmliang_) of Trend Micro Zero Day
Initiative and Murray McAllister of Insomnia Security - A CyberCX Company for
reporting this issue to us.

Response Matrix 3a:

Product     Version Running CVE           CVSSv3 Severity Fixed Version      Workarounds Additional
                    On      Identifier                                                   Documentation
ESXi        7.0     Any     CVE-2020-3999 3.3    low      ESXi70U1c-17325551 None        None
ESXi        6.7     Any     CVE-2020-3999 N/A    N/A      Unaffected         N/A         N/A
ESXi        6.5     Any     CVE-2020-3999 N/A    N/A      Unaffected         N/A         N/A
Workstation 16.x    Any     CVE-2020-3999 3.3    low      16.0               None        None
Workstation 15.x    Any     CVE-2020-3999 3.3    low      15.5.7             None        None
Fusion      12.x    OS X    CVW-2020-3999 3.3    low      12.0               None        None
Fusion      11.x    OS X    CVE-2020-3999 3.3    low      11.5.7             None        None

Impacted Product Suites that Deploy Response Matrix 3a Components:

Product    Version Running CVE           CVSSv3 Severity Fixed      Workarounds Additional
                   On      Identifier                    Version                Documentation
Cloud                                                    Patch
Foundation 4.x     Any     CVE-2020-3999 3.3    low      pending    None        None
(ESXi)
Cloud
Foundation 3.x     Any     CVE-2020-3999 N/A    N/A      Unaffected N/A         N/A
(ESXi)

4. References

VMware Patch Release ESXi 7.0 ESXi70U1c-17325551
https://my.vmware.com/group/vmware/patch
https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-esxi-70u1c.html


VMware Workstation Pro 16.0 
Downloads and Documentation:
https://www.vmware.com/go/downloadworkstation

https://docs.vmware.com/en/VMware-Workstation-Pro/index.html

 
VMware Workstation Player 16.0 
Downloads and Documentation:
https://www.vmware.com/go/downloadplayer
https://docs.vmware.com/en/VMware-Workstation-Player/index.html


VMware Workstation Pro 15.5.7

https://www.vmware.com/go/downloadworkstation
https://docs.vmware.com/en/VMware-Workstation-Pro/index.html
 

VMware Workstation Player 15.5.7
https://www.vmware.com/go/downloadplayer
https://docs.vmware.com/en/VMware-Workstation-Player/index.html
 

VMware Fusion 12.0 
Downloads and Documentation:
https://www.vmware.com/go/downloadfusion
https://docs.vmware.com/en/VMware-Fusion/index.html


VMware Fusion 11.5.7

Downloads and Documentation:
https://www.vmware.com/go/downloadfusion
https://docs.vmware.com/en/VMware-Fusion/index.html

 

Mitre CVE Dictionary Links:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3999


FIRST CVSSv3 Calculator:

CVE-2020-3999 - https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/
PR:L/UI:N/S:U/C:N/I:N/A:L

5. Change Log

2020-12-17: VMSA-2020-0029
Initial security advisory.




_______________________________________________
Security-announce mailing list
Security-announce@lists.vmware.com
https://lists.vmware.com/mailman/listinfo/security-announce

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBX9xDDeNLKJtyKPYoAQiUeg//Zow2/DRDwocSPb7+yqEffKLRdlFQ3Z87
89yRBCOXnShTq7Rj/9KMpkORfjKZ3cX2tW6HTj2ZmmoBGsFDccxmE+GAkE7YPvEz
Gphafns5oJnlinCyeTXuE2jRQJKE7TU2RK0ubV2T0wGIlPS48ikjUzobu27Qz1E7
1uytxpTawLyKlKu7oQLeVzYsB+rNaENR5vYjFKQoe87sBBAgw/YfHFAcoHnN0heh
c97X5v4Z8rpYjya9YhUj33/lq8S9B8kR41Suu0YUmMRdm+8wDCHQy/HDWGzeV2IQ
JaahZjs1eEwSjHU3KWnZ6rpBkDbWT/zT5MvsOGzWgVNmVFrkVd/GJdyOKBk/tIvx
A8JgzAzBHozb4lLdUu4f1i8yOCn4VWIVGgdzsuqCWLNn6opkNR5p9PXKKzesvVQC
G1JnXHTHo8EeuJV1obYQKEH9bBveZrTq7KoQbC/XhrP36Uaunfj6POgzINj0WbQN
FbIvxj3O186jCb4cKdj0pIAPPhh4GW82XH9C1CiM0krwS6gcfO4UihskkPpoNqp2
aul63fSPuZFYvwqTgQQhQ7jdJp0HVHiKKoPNZyVUwx0fymkyjWQvAoAeTk+ARTuo
hbSKThH5WDlrzdETVApyJUopspLCTZNJgTHbydoUC7zBuRib3xiN5b3067qHj6n+
94Vo4ZVHa5k=
=+/17
-----END PGP SIGNATURE-----