what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

VMware Security Advisory 2015-0004

VMware Security Advisory 2015-0004
Posted Jun 9, 2015
Authored by VMware | Site vmware.com

VMware Security Advisory 2015-0004 - VMware Workstation, Fusion and Horizon View Client updates address critical security issues.

tags | advisory
advisories | CVE-2012-0897, CVE-2015-2336, CVE-2015-2337, CVE-2015-2338, CVE-2015-2339, CVE-2015-2340, CVE-2015-2341
SHA-256 | 3bbc42ddc83cb7369651a0d279f93ac38004090680d2c4d23db0f3d8c7f2a690

VMware Security Advisory 2015-0004

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
VMware Security Advisory

Advisory ID: VMSA-2015-0004
Synopsis: VMware Workstation, Fusion and Horizon View Client updates
address critical security issues
Issue Date: 2015-06-09
Updated on: 2015-06-09 (Initial Advisory)
CVE number: CVE-2012-0897, CVE-2015-2336, CVE-2015-2337, CVE-2015-2338,
CVE-2015-2339, CVE-2015-2340, CVE-2015-2341

1. Summary

VMware Workstation, Fusion and Horizon View Client updates address
critical security issues.

2. Relevant Releases

VMware Workstation prior to version 11.1.1
VMware Workstation prior to version 10.0.6
VMware Player prior to version 7.1.1
VMware Player prior to version 6.0.6
VMware Fusion prior to version 7.0.1
VMware Fusion prior to version 6.0.6

VMware Horizon Client for Windows prior to version 3.4.0
VMware Horizon Client for Windows prior to version 3.2.1
VMware Horizon Client for Windows (with local mode) prior to version
5.4.1

3. Problem Description

a. VMware Workstation and Horizon Client memory manipulation issues

VMware Workstation and Horizon Client TPView.ddl and TPInt.dll
incorrectly handle memory allocation. On Workstation, this may
allow a guest to execute code or perform a Denial of Service on
the Windows OS that runs Workstation. In the case of a Horizon
Client, this may allow a View desktop to execute code or perform
a Denial of Service on the Windows OS that runs the Horizon Client.

VMware would like to thank Kostya Kortchinsky of the Google
Security Team for reporting these issues to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifiers CVE-2012-0897 and CVE-2015-2336
(TPView.dll Code Execution), CVE-2015-2338 and CVE-2015-2339
(TPview.dll DoS), CVE-2015-2337 (TPInt.dll Code Execution), and
CVE-2015-2340 (TPInt.dll DoS) to these issues.

Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

VMware Product Running Replace with/
Product Version on Apply Patch**
============= ======= ======= =================
VMware Workstation 11.x Windows 11.1.1
VMware Workstation 10.x Windows 10.0.6

VMware Player 7.x Windows 7.1.1
VMware Player 6.x Windows 6.0.6

VMware Horizon Client for 3.3.x Windows 3.4.0
Windows
VMware Horizon Client for 3.2.x Windows 3.2.1
Windows
VMware Horizon Client for 5.x Windows 5.4.2
Windows (with local mode)

b. VMware Workstation, Player, and Fusion Denial of Service
vulnerability

VMware Workstation, Player, and Fusion contain an input
validation issue on an RPC command. This issue may allow
for a Denial of Service of the Guest Operating System (32-bit) or
a Denial of Service of the Host Operating System (64-bit).

VMware would like to thank Peter Kamensky from Digital
Security for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2015-2341 to this issue.

Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.

VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5

Player 7.x any not affected
Player 6.x any 6.0.6

Fusion 7.x OSX 7.0.1
Fusion 6.x OSX 6.0.6

4. Solution

Please review the patch/release notes for your product and
version and verify the checksum of your downloaded file.

VMware Workstation 11.1.1, 10.0.6
Downloads and Documentation:
https://www.vmware.com/go/downloadworkstation

VMware Player 7.1.1, 6.0.6
Downloads and Documentation:
https://www.vmware.com/go/downloadplayer

VMware Fusion 7.0.1, 6.0.6
https://www.vmware.com/go/downloadfusion

VMware Horizon Clients 5.4.2, 3.4.0, and 3.2.1
Downloads and Documentation:
https://www.vmware.com/go/viewclients

5. References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0897
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2336
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2337
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2338
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2339
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2340
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2341

- ------------------------------------------------------------------------

6. Change log

2015-06-09 VMSA-2015-0004
Initial security advisory in conjunction with the release of VMware
Workstation 11.1.1 and Horizon Client for Windows 3.2.1 on 2015-06-09.

- ------------------------------------------------------------------------

7. Contact

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org

E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

Consolidated list of VMware Security Advisories
http://kb.vmware.com/kb/2078735

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html

Twitter
https://twitter.com/VMwareSRC

Copyright 2015 VMware Inc. All rights reserved.




-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.2 (Build 15337)
Charset: utf-8

wj8DBQFVdx3oDEcm8Vbi9kMRAngXAKClezVd4z7zQSx7oN2sY/e4xL2yQACfdjgt
xZFTQoodunKFGfkCMqJ13M8=
=z/Tn
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close