Executive Summary
Summary | |
---|---|
Title | - VMware ESXi, vCenter Server, Fusion & Workstation updates resolve multiple security vulnerabilities |
Informations | |||
---|---|---|---|
Name | VMSA-2017-0015 | First vendor Publication | 2017-09-14 |
Vendor | VMware | Last vendor Modification | 2017-09-18 |
Severity (Vendor) | N/A | Revision | 2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
a. Out-of-bounds write vulnerability in SVGA VMware ESXi, Workstation & Fusion contain an out-of-bounds write vulnerability in SVGA device. This issue may allow a guest to execute code on the host. VMware would like to thank Nico Golde and Ralf-Philipp Weinmann of Comsecuris UG (haftungsbeschraenkt) working with ZDI for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2017-4924 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. b. Guest RPC NULL pointer dereference vulnerability VMware ESXi, Workstation & Fusion contain a NULL pointer dereference vulnerability. This issue occurs when handling guest RPC requests. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs. VMware would like to thank Zhang Haitao for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2017-4925 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. c. Stored XSS in H5 Client vCenter Server H5 Client contains a vulnerability that may allow for stored cross-site scripting (XSS). An attacker with VC user privileges can inject malicious java-scripts which will get executed when other VC users access the page. VMware would like to thank Thomas Ornetzeder for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2017-4926 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. |
Original Source
Url : http://www.vmware.com/security/advisories/VMSA-2017-0015.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
33 % | CWE-476 | NULL Pointer Dereference |
33 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-09-21 | Name : A virtualization application installed on the remote macOS or Mac OS X host i... File : macosx_fusion_vmsa_2017_0015__8_5_4.nasl - Type : ACT_GATHER_INFO |
2017-09-21 | Name : A virtualization application installed on the remote macOS or Mac OS X host i... File : macosx_fusion_vmsa_2017_0015__8_5_8.nasl - Type : ACT_GATHER_INFO |
2017-09-21 | Name : The remote VMware ESXi 5.5 host is affected by an RPC NULL pointer dereferenc... File : vmware_esxi_5_5_build_6480267_remote.nasl - Type : ACT_GATHER_INFO |
2017-09-21 | Name : The remote VMware ESXi 6.5 host is affected by multiple vulnerabilities. File : vmware_esxi_6_5_build_5969300_remote.nasl - Type : ACT_GATHER_INFO |
2017-09-21 | Name : A virtualization management application installed on the remote host is affec... File : vmware_vcenter_vmsa-2017-0015.nasl - Type : ACT_GATHER_INFO |
2017-09-21 | Name : A virtualization application installed on the remote Linux host is affected b... File : vmware_workstation_linux_vmsa_2017_0015.nasl - Type : ACT_GATHER_INFO |
2017-09-21 | Name : A virtualization application installed on the remote Windows host is affected... File : vmware_workstation_win_vmsa_2017_0015.nasl - Type : ACT_GATHER_INFO |
2017-09-20 | Name : The remote VMware ESXi 6.0 host is affected by multiple vulnerabilities. File : vmware_esxi_6_0_build_5485776_remote.nasl - Type : ACT_GATHER_INFO |
2017-09-20 | Name : The remote VMware ESXi host is missing one or more security-related patches. File : vmware_VMSA-2017-0015.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2017-09-28 21:25:21 |
|
2017-09-22 13:24:46 |
|
2017-09-21 21:26:34 |
|
2017-09-21 13:25:07 |
|
2017-09-19 09:22:58 |
|
2017-09-15 17:25:02 |
|
2017-09-15 17:22:59 |
|
2017-09-15 09:22:45 |
|