Executive Summary

Summary
Title : VMware ESXi, Workstation, Fusion, & Tools updates address multiple security issues
Informations
Name VMSA-2016-0014 First vendor Publication 2016-09-13
Vendor VMware Last vendor Modification 2017-12-21
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

a. VMware Workstation heap-based buffer overflow vulnerabilities via Cortado ThinPrint

VMware Workstation contains vulnerabilities that may allow a windows -based virtual machine (VM) to trigger heap-based buffer overflows in the windows-based hypervisor running VMware workstation that the VM resides on. Exploitation of this issue may lead to arbitrary code execution in the hypervisor OS.

Exploitation is only possible if virtual printing has been enabled in VMware Workstation. This feature is not enabled by default. VMware Knowledge Base article 2146810 documents the procedure for enabling and disabling this feature.

VMware would like to thank E0DB6391795D7F629B5077842E649393 working with Trend Micro's Zero Day Initiative for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7081 to this issue.

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

b. VMware Workstation memory corruption vulnerabilities via Cortado Thinprint

VMware Workstation contains vulnerabilities that may allow a windows -based virtual machine (VM) to corrupt memory in the windows-based hypervisor running VMware workstation that the VM resides on. These include TrueType fonts embedded in EMFSPOOL (CVE-2016-7083), and JPEG2000 images (CVE-2016-7084) in tpview.dll. Exploitation of these issues may lead to arbitrary code execution in the hypervisor OS.

Exploitation is only possible if virtual printing has been enabled in VMware Workstation. This feature is not enabled by default. VMware Knowledge Base article 2146810 documents the procedure for enabling and disabling this feature.

VMware would like to thank Mateusz Jurczyk of Google's Project Zero for reporting these issues to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2016-7083, and CVE-2016-7084 to these issues.

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

c. VMware Tools NULL pointer dereference vulnerabilities

The graphic acceleration functions used in VMware Tools for OSX handle memory incorrectly. Two resulting NULL pointer dereference vulnerabilities may allow for local privilege escalation on Virtual Machines that run OSX.

The issues can be remediated by installing a fixed version of VMware Tools on affected OSX VMs directly. Alternatively the fixed version of Tools can be installed through ESXi or Fusion after first updating to a version of ESXi or Fusion that ships with a fixed version of VMware Tools.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2016-7079 and CVE-2016-7080 to these issues.

VMware would like to thank Dr. Fabien Duchene "FuzzDragon" and Jian Zhu for independently reporting these issues to VMware.

d. VMware Workstation installer DLL hijacking issue

Workstation Pro/Player installer contains a DLL hijacking issue that exists due to some DLL files loaded by the application improperly. This issue may allow an unauthenticated remote attacker to load this DLL file of the attacker's choosing that could execute arbitrary code.

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware would like to thank Anand Bhat and Himanshu Mehta for individually reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7085 to this issue.

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

e. VMware Workstation installer insecure executable loading vulnerability

Workstation installer contains an insecure executable loading vulnerability that may allow an attacker to execute any exe file placed in the same directory as installer with the name "setup64.exe".Successfully exploiting this issue may allow attackers to escalate their privileges and execute arbitrary code.

VMware would like to thank Adam Bridge for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7086 to this issue.

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

f. Workstation EMF file handling memory corruption vulnerability via Cortado ThinPrint

VMware Workstation contains a vulnerability that may allow a Windows -based virtual machine (VM) to corrupt memory. This issue occurs due to improper handling of EMF files in tpview.dll. Exploitation of this issue may lead to arbitrary code execution in the hypervisor OS.

The severity of this issue has changed to Low from Critical as the exploitation of the issue requires a custom registry value to be added on the host machine.

Exploitation is only possible if virtual printing has been enabled in VMware Workstation. This feature is not enabled by default. VMware Knowledge Base article 2146810 documents the procedure for enabling and disabling this feature.

VMware would like to thank Mateusz Jurczyk of Google's Project Zero and Yakun Zhang of McAfee for individually reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7082 to this issue.

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

Original Source

Url : http://www.vmware.com/security/advisories/VMSA-2016-0014.html

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
25 % CWE-476 NULL Pointer Dereference
12 % CWE-426 Untrusted Search Path
12 % CWE-264 Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 71
Application 4
Application 4

Nessus® Vulnerability Scanner

Date Description
2016-09-15 Name : A virtualization application installed on the remote Mac OS X host is affecte...
File : macosx_fusion_vmsa_2016_0014.nasl - Type : ACT_GATHER_INFO
2016-09-15 Name : A virtualization application installed on the remote Mac OS X host is affecte...
File : macosx_vmware_tools_vmsa_2016_0014.nasl - Type : ACT_GATHER_INFO
2016-09-15 Name : The remote VMware ESXi host is missing a security-related patch.
File : vmware_VMSA-2016-0014.nasl - Type : ACT_GATHER_INFO
2016-09-15 Name : A virtualization application installed on the remote host is affected by mult...
File : vmware_workstation_multiple_vmsa_2016_0014.nasl - Type : ACT_GATHER_INFO
2016-02-19 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2016-0014.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2017-12-22 09:20:45
  • Multiple Updates
2016-12-29 21:25:16
  • Multiple Updates
2016-12-29 13:22:01
  • Multiple Updates
2016-09-16 13:24:48
  • Multiple Updates
2016-09-13 21:24:05
  • First insertion