Executive Summary
Summary | |
---|---|
Title | VMware Horizon View Agent, VMware ESXi, Workstation, and Fusion updates resolve multiple security issues |
Informations | |||
---|---|---|---|
Name | VMSA-2018-0018 | First vendor Publication | 2018-07-19 |
Vendor | VMware | Last vendor Modification | 2018-07-19 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 4 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
a. VMware Horizon View Agent local information disclosure vulnerability VMware Horizon View Agents contain a local information disclosure vulnerability due to insecure logging of credentials in the vmmsi.log file when an account other than the currently logged on user is specified during installation (including silent installations). Successful exploitation of this issue may allow low privileged users access to the credentials specified during the Horizon View Agent installation. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-6971 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. b. ESXi, Workstation, and Fusion denial-of-service vulnerability VMware ESXi, Workstation, and Fusion contain a denial-of-service vulnerability due to NULL pointer dereference issue in RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs. VMware would like to thank Hahna Latonick and Kevin Fujimoto working with Trend Micro's Zero Day Initiative for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-6972 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. |
Original Source
Url : http://www.vmware.com/security/advisories/VMSA-2018-0018.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-532 | Information Leak Through Log Files |
50 % | CWE-476 | NULL Pointer Dereference |
CPE : Common Platform Enumeration
Alert History
Date | Informations |
---|---|
2018-10-03 00:21:35 |
|
2018-10-02 21:22:05 |
|
2018-07-25 17:21:14 |
|
2018-07-20 05:17:41 |
|