VMSA-2015-0004

VMware Workstation, Fusion and Horizon View Client updates address critical security issues

VMware Security Advisory
 
VMware Security Advisory Advisory ID:
  VMSA-2015-0004
VMware Security Advisory Synopsis:
  VMware Workstation, Fusion and Horizon View Client updates address critical security issues
VMware Security Advisory Issue date:
  2015-06-09
VMware Security Advisory Updated on:
  2015-06-09 (Initial Advisory)
VMware Security Advisory CVE numbers:
  CVE-2012-0897, CVE-2015-2336, CVE-2015-2337, CVE-2015-2338,CVE-2015-2339, CVE-2015-2340, CVE-2015-2341
1. Summary

VMware Workstation, Fusion and Horizon View Client updates address critical security issues.

2. Relevant Releases

VMware Workstation prior to version 11.1.1
VMware Workstation prior to version 10.0.6
VMware Player prior to version 7.1.1
VMware Player prior to version 6.0.6
VMware Fusion prior to version 7.0.1
VMware Fusion prior to version 6.0.6

VMware Horizon Client for Windows prior to version 3.4.0
VMware Horizon Client for Windows prior to version 3.2.1
VMware Horizon Client for Windows (with local mode) prior to version 5.4.1

3. Problem Description

a. VMware Workstation and Horizon Client memory manipulation issues

VMware Workstation and Horizon Client TPView.dll and TPInt.dll incorrectly handle memory allocation. On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon Client.

VMware would like to thank Kostya Kortchinsky of the Google Security Team for reporting these issues to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2012-0897 and CVE-2015-2336 (TPView.dll Code Execution), CVE-2015-2338 and CVE-2015-2339 (TPview.dll DoS), CVE-2015-2337 (TPInt.dll Code Execution), and CVE-2015-2340 (TPInt.dll DoS) to these issues.

Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product
Product Version
Running on
Replace with/ Apply Patch
VMware Product VMware Workstation
Product Version 11.x
Running on windows
Replace with/ Apply Patch 11.1.1
VMware Product VMware Workstation
Product Version 10.x
Running on windows
Replace with/ Apply Patch 10.0.6
VMware Product VMware Player
Product Version 7.x
Running on windows
Replace with/ Apply Patch 7.1.1
VMware Product VMware Player
Product Version 6.x
Running on windows
Replace with/ Apply Patch 6.0.6
VMware Product VMware Horizon Client for Windows
Product Version 3.3.x
Running on windows
Replace with/ Apply Patch 3.4.0
VMware Product VMware Horizon Client for Windows
Product Version 3.2.x
Running on windows
Replace with/ Apply Patch 3.2.1
VMware Product VMware Horizon Client for Windows (with local mode)
Product Version 5.x
Running on windows
Replace with/ Apply Patch 5.4.2

b. VMware Workstation, Player, and Fusion Denial of Service vulnerability

 

VMware Workstation, Player, and Fusion contain an input validation issue on an RPC command. This issue may allow for a Denial of Service of the Guest  Operating System (32-bit) or a Denial of Service of the Host Operating System (64-bit).

 

VMware would like to thank Peter Kamensky from Digital Security for reporting this issue to us.

 

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2015-2341 to this issue.

 

Column 4 of the following table lists the action required to remediate the
vulnerability in each release, if a solution is available.

VMware Product
Product Version
Running on
Replace with/ Apply Patch
VMware Product VMware Workstation
Product Version 11.x
Running on any
Replace with/ Apply Patch not affected
VMware Product VMware Workstation
Product Version 10.x
Running on any
Replace with/ Apply Patch 10.0.5
VMware Product VMware Player
Product Version 7.x
Running on any
Replace with/ Apply Patch not affected
VMware Product VMware Player
Product Version 6.x
Running on any
Replace with/ Apply Patch 6.0.6
VMware Product Fusion
Product Version 7.x
Running on OSX
Replace with/ Apply Patch 7.0.1
VMware Product Fusion
Product Version 6.x
Running on OSX
Replace with/ Apply Patch 6.0.6
4. Solution

Please review the patch/release notes for your product and
version and verify the checksum of your downloaded file.

VMware Workstation 11.1.1, 10.0.6
Downloads and Documentation:
https://www.vmware.com/go/downloadworkstation

VMware Player 7.1.1, 6.0.6
Downloads and Documentation:
https://www.vmware.com/go/downloadplayer

VMware Fusion 7.0.1, 6.0.6
https://www.vmware.com/go/downloadfusion

VMware Horizon Clients 5.4.2, 3.4.0, and 3.2.1
Downloads and Documentation:
https://www.vmware.com/go/viewclients

6. Change log

2015-06-09 VMSA-2015-0004
Initial security advisory in conjunction with the release of VMware Workstation 11.1.1 and Horizon Client for Windows 3.2.1 on 2015-06-09.

7. Contact

 

E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

 

This Security Advisory is posted to the following lists:

 

 security-announce at lists.vmware.com
 bugtraq at securityfocus.com
 fulldisclosure at seclists.org

 

E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055

 

VMware Security Advisories
http://www.vmware.com/security/advisories

 

Consolidated list of VMware Security Advisories
http://kb.vmware.com/kb/2078735

 

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

 

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
 
Twitter
https://twitter.com/VMwareSRC

 

Copyright 2015 VMware Inc.  All rights reserved.

 

 

Sign up for Security Advisories

Enter your email address: