Twenty Year Anniversary

VMware Security Advisory 2018-0007

VMware Security Advisory 2018-0007
Posted Feb 8, 2018
Authored by VMware | Site

VMware Security Advisory 2018-0007 - VMware Virtual Appliance updates address side-channel analysis due to speculative execution.

tags | advisory
advisories | CVE-2017-5715, CVE-2017-5753, CVE-2017-5754
MD5 | 8ef7e64adb8f4d4ff7d94be1d0f4763d

VMware Security Advisory 2018-0007

Change Mirror Download
Hash: SHA1

- ------------------------------------------------------------------------
VMware Security Advisory

Advisory ID: VMSA-2018-0007
Severity: Important
Synopsis: VMware Virtual Appliance updates address side-channel
analysis due to speculative execution
Issue date: 2018-02-08
Updated on: 2018-02-08 (Initial Advisory)
CVE number: CVE-2017-5753, CVE-2017-5715, CVE-2017-5754

1. Summary

VMware Virtual Appliance updates address side-channel analysis due
to speculative execution


This document will focus on VMware Virtual Appliances which are
affected by the known variants of CVE-2017-5753, CVE-2017-5715, and
CVE-2017-5754. For more information please see Knowledge Base article

These mitigations are part of the Operating System-Specific
Mitigations category described in VMware Knowledge Base article

2. Relevant Products

vCloud Usage Meter (UM)
Identity Manager (vIDM)
vCenter Server (vCSA)
vSphere Data Protection (VDP)
vSphere Integrated Containers (VIC)
vRealize Automation (vRA)

3. Problem Description

VMware Virtual Appliance Mitigations for Bounds-Check bypass, Branch
Target Injection, and Rogue data cache load issues

CPU data cache timing can be abused to efficiently leak information
out of mis-speculated CPU execution, leading to (at worst) arbitrary
virtual memory read vulnerabilities across local security boundaries
in various contexts. (Speculative execution is an automatic and
inherent CPU performance optimization used in all modern processors.)
Successful exploitation may allow for information disclosure.

The Common Vulnerabilities and Exposures project ( has
assigned the identifiers CVE-2017-5753 (Bounds Check bypass),
CVE-2017-5715 (Branch Target Injection), CVE-2017-5754 (Rogue data
cache load) to these issues.

Column 5 of the following table lists the action required to
mitigate the observed vulnerability in each release, if a solution
is available.

VMware Product Running Replace with/ Mitigation/
Product Version on Severity Apply Patch Workaround
========== ========= ======= ========= ============= ==========
UM 3.x VA Important Patch Pending KB52467

vIDM 3.x, 2.x VA Important Patch Pending KB52284

vCSA 6.5 VA Important Patch Pending KB52312
vCSA 6.0 VA Important Patch Pending KB52312
vCSA 5.5 VA N/A Unaffected None

VDP 6.x VA Important Patch Pending None

VIC 1.x VA Important 1.3.1 None

vRA 7.x VA Important Patch Pending KB52377
vRA 6.x VA Important Patch Pending KB52497

4. Solution

Please review the patch/release notes for your product and version
and verify the checksum of your downloaded file.

vSphere Integrated Containers 1.3.1
Downloads and Documentation:

5. References

- ------------------------------------------------------------------------

6. Change log

2018-02-08: VMSA-2018-0007
Initial security advisory in conjunction with the release of vSphere
Integrated Containers 1.3.1 on 2018-02-08.

- ------------------------------------------------------------------------

7. Contact

E-mail list for product security notifications and announcements:

This Security Advisory is posted to the following lists:

E-mail: security at
PGP key at:

VMware Security Advisories

VMware Security Response Policy

VMware Lifecycle Support Phases

VMware Security & Compliance Blog


Copyright 2018 VMware Inc. All rights reserved.



RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

September 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    3 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    18 Files
  • 6
    Sep 6th
    18 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    2 Files
  • 9
    Sep 9th
    2 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    17 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    29 Files
  • 14
    Sep 14th
    21 Files
  • 15
    Sep 15th
    3 Files
  • 16
    Sep 16th
    1 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    16 Files
  • 19
    Sep 19th
    29 Files
  • 20
    Sep 20th
    18 Files
  • 21
    Sep 21st
    5 Files
  • 22
    Sep 22nd
    2 Files
  • 23
    Sep 23rd
    2 Files
  • 24
    Sep 24th
    15 Files
  • 25
    Sep 25th
    69 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By