VMSA-2017-0005

VMware Workstation and Fusion updates address out-of-bounds memory access vulnerability

VMware Security Advisory
 
VMware Security Advisory Advisory ID:
 VMSA-2017-0005
VMware Security Advisory Severity:
 Critical
VMware Security Advisory Synopsis:
 VMware Workstation and Fusion updates address critical out-of-bounds memory access vulnerability
VMware Security Advisory Issue date:
2017-03-14
VMware Security Advisory Updated on:
 2017-03-14 (Initial Advisory)
VMware Security Advisory CVE numbers:
CVE-2017-4901
 
1. Summary

VMware Workstation and Fusion updates address critical out-of-bounds memory access vulnerability.

 

2. Relevant Products
  • VMware Workstation Pro / Player
  • VMware Fusion Pro / Fusion
3. Problem Description

a. VMware Workstation and Fusion out-of-bounds memory access vulnerability

 

The drag-and-drop (DnD) function in VMware Workstation and Fusion has an out-of-bounds memory access vulnerability. This may allow a guest to execute code on the operating system that runs Workstation or Fusion.

 

Workaround
On Workstation Pro and Fusion, the issue cannot be exploited if both the drag-and-drop function and the copy-and-paste (C&P) function are disabled. Refer to the Reference section on documentation how to disable these functions. This workaround is not available on Workstation Player.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2017-4901 to this issue.  

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Mitigation/ Workaround
VMware Product Workstation Pro
Product Version 12.x
Running on Any
Severity Critical
Replace with/ Apply Patch 12.5.4
Mitigation/ Workaround Disable DnD and C&P
VMware Product Workstation Player
Product Version 12.x
Running on Any
Severity Critical
Replace with/ Apply Patch 12.5.4
Mitigation/ Workaround None
VMware Product Fusion Pro, Fusion
Product Version 8.x
Running on Mac OS X
Severity Critical
Replace with/ Apply Patch 8.5.5
Mitigation/ Workaround Disable DnD and C&P
VMware Product ESXi
Product Version Any
Running on ESXi
Severity N/A
Replace with/ Apply Patch Not affected
Mitigation/ Workaround N/A

 

 

4. Solution

 

Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.

VMware Workstation Pro 12.5.4 
Downloads and Documentation
https://www.vmware.com/go/downloadworkstation
https://www.vmware.com/support/pubs/ws_pubs.html


VMware Workstation Player 12.5.4
Downloads and Documentation
https://www.vmware.com/go/downloadplayer
https://www.vmware.com/support/pubs/player_pubs.html

VMware Fusion Pro / Fusion 8.5.5
Downloads and Documentation
https://www.vmware.com/go/downloadfusion

https://www.vmware.com/support/pubs/fusion_pubs.html

5. References
 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4901

 

Workaround documentation  


Workstation Pro
Disabling drag-and-drop and copy-and-paste functionality, page 81 and 82

http://pubs.vmware.com/workstation-12/topic/com.vmware.ICbase/PDF/workstation-pro-12-user-guide.pdf

Fusion
Disabling drag-and-drop and copy-and-paste functionality, page 135

http://pubs.vmware.com/fusion-8/topic/com.vmware.ICbase/PDF/fusion-8-user-guide.pdf

6. Change log

 

2017-03-14 VMSA-2017-0005
Initial security advisory in conjunction with the release of VMware Workstation Pro/Player 12.5.4 and VMware Fusion Pro, Fusion 8.5.5 on 2017-03-14

7. Contact

 

E-mail list for product security notifications and announcements:

http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

 

This Security Advisory is posted to the following lists:

security-announce@lists.vmware.com

bugtraq@securityfocus.com

fulldisclosure@seclists.org

 

E-mail: security@vmware.com

PGP key at:

https://kb.vmware.com/kb/1055

 

VMware Security Advisories

http://www.vmware.com/security/advisories

 

VMware Security Response Policy

https://www.vmware.com/support/policies/security_response.html

 

VMware Lifecycle Support Phases

https://www.vmware.com/support/policies/lifecycle.html

 

Twitter

https://twitter.com/VMwareSRC

 

Copyright 2017 VMware Inc. All rights reserved.