VMSA-2018-0018

VMware Horizon View Agent, VMware ESXi, Workstation, and Fusion updates resolve multiple security issues

VMware Security Advisory
 
VMware Security Advisory Advisory ID:
  VMSA-2018-0018
VMware Security Advisory Severity:
  Important
VMware Security Advisory Synopsis:
  VMware Horizon View Agent, VMware ESXi, Workstation, and Fusion updates resolve multiple security issues
VMware Security Advisory Issue date:
  2018-07-19
VMware Security Advisory Updated on:
  2018-07-19 (Initial Advisory)
VMware Security Advisory CVE numbers:
  CVE-2018-6971, CVE-2018-6972
1. Summary

VMware Horizon View Agent, VMware ESXi, Workstation, and Fusion updates resolve multiple security issues

2. Relevant Products
  • VMware Horizon View Agent (View Agent)
  • VMware vSphere Hypervisor (ESXi)
  • VMware Workstation Pro / Player (Workstation)
  • VMware Fusion Pro, Fusion (Fusion)
3. Problem Description

a. VMware Horizon View Agent local information disclosure vulnerability

 

VMware Horizon View Agents contain a local information disclosure vulnerability due to insecure logging of credentials in the vmmsi.log file when an account other than the currently logged on user is specified during installation (including silent installations). Successful exploitation of this issue may allow low privileged users access to the credentials specified during the Horizon View Agent installation.

 

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-6971 to this issue.


Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Mitigation/ Workaround
VMware Product View Agent
Product Version 7.x.x
Running on Windows
Severity Important
Replace with/ Apply Patch 7.5.1*
Mitigation/ Workaround KB56631

*The Horizon View Agent 7.5.1 upgrade process will attempt to remove vmmsi.log files which may contain installation credentials. This process may not be effective if the temporary windows directory (%TEMP%) was changed after installation or if these logs have been collected by an external solution such as VMware vRealize Log Insight or a similar 3rd party product. Please see KB56631 for more details on manual cleanup.

 

b. ESXi, Workstation, and Fusion denial-of-service vulnerability

VMware ESXi, Workstation, and Fusion contain a denial-of-service vulnerability due to NULL pointer dereference issue in RPC handler. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs.

 

VMware would like to thank Hahna Latonick and Kevin Fujimoto working with Trend Micro's Zero Day Initiative for reporting this issue to us.

 

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-6972 to this issue.


Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Mitigation/ Workaround
VMware Product ESXi
Product Version 6.7
Running on Any
Severity Moderate
Replace with/ Apply Patch ESXi670-201806401-BG
Mitigation/ Workaround None
VMware Product ESXi
Product Version 6.5
Running on Any
Severity Moderate
Replace with/ Apply Patch ESXi650-201806401-BG
Mitigation/ Workaround None
VMware Product ESXi
Product Version 6.0
Running on Any
Severity Moderate
Replace with/ Apply Patch ESXi600-201806401-BG
Mitigation/ Workaround None
VMware Product ESXi
Product Version 5.5
Running on Any
Severity Moderate
Replace with/ Apply Patch ESXi550-201806401-BG
Mitigation/ Workaround None
VMware Product Workstation
Product Version 14.x
Running on Any
Severity Moderate
Replace with/ Apply Patch 14.1.2
Mitigation/ Workaround None
VMware Product Fusion
Product Version 10.x
Running on OSX
Severity Moderate
Replace with/ Apply Patch 10.1.2
Mitigation/ Workaround None

4. Solution

 

Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.

 

 

VMware Horizon View Agent 7.5.1

Downloads and Documentation:
https://my.vmware.com/group/vmware/details?downloadGroup=VIEW-751-STD&productId=757&rPId=24550

ESXi 6.7
Downloads: https://my.vmware.com/group/vmware/patch
Documentation: https://kb.vmware.com/s/article/55920

ESXi 6.5

Downloads: https://my.vmware.com/group/vmware/patch

Documentation: https://kb.vmware.com/s/article/55915

 

ESXi 6.0

Downloads: https://my.vmware.com/group/vmware/patch

Documentation: https://kb.vmware.com/s/article/55910

 

ESXi 5.5

Downloads: https://my.vmware.com/group/vmware/patch

Documentation: https://kb.vmware.com/s/article/55905

 

VMware Workstation Pro 14.1.2

Downloads: https://www.vmware.com/go/downloadworkstation

Documentation: https://docs.vmware.com/en/VMware-Workstation-Pro/index.html    

 

VMware Workstation Player 14.1.2

Downloads: https://www.vmware.com/go/downloadplayer

Documentation: https://docs.vmware.com/en/VMware-Workstation-Player/index.html       

 

VMware Fusion Pro / Fusion 10.1.2

Downloads: https://www.vmware.com/go/downloadfusion

Documentation: https://docs.vmware.com/en/VMware-Fusion/index.html
  

6. Change log

 

2018-07-19: VMSA-2018-0018
Initial security advisory in conjunction with the release of VMware Horizon View Agent 7.5.1 on 2018-07-19.

 

7. Contact

 

E-mail list for product security notifications and announcements:

https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

 

This Security Advisory is posted to the following lists:

  security-announce@lists.vmware.com

  bugtraq@securityfocus.com

  fulldisclosure@seclists.org

 

E-mail: security@vmware.com

PGP key at:

https://kb.vmware.com/kb/1055

 

VMware Security Advisories

https://www.vmware.com/security/advisories

 

VMware Security Response Policy

https://www.vmware.com/support/policies/security_response.html

 

VMware Lifecycle Support Phases

https://www.vmware.com/support/policies/lifecycle.html

 

VMware Security & Compliance Blog  

https://blogs.vmware.com/security

 

Twitter

https://twitter.com/VMwareSRC

 

Copyright 2018 VMware Inc. All rights reserved.

 

Sign up for Security Advisories

Enter your email address: