VID |
23256 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
VMware Workstation is one of the commercial software products that allow the creation and execution of multiple virtual computers simultaneously on the same system without having to reboot or partition the drive.
The version of VMware Workstation installed on the remote host is 12.x prior to 12.5.0. It is, therefore, affected by multiple vulnerabilities :
- A heap buffer overflow condition exists in Cortado ThinPrint due to improper validation of user-supplied input. An attacker on the guest can exploit this to cause a denial of service condition or the execution of arbitrary code on the host system. (CVE-2016-7081)
- A memory corruption issue exists in Cortado Thinprint due to improper handling of specially crafted EMF files. An attacker on the guest can exploit this to cause a denial of service condition or the execution of arbitrary code on the host system. (CVE-2016-7082)
- A memory corruption issue exists in Cortado Thinprint due to improper handling of TrueType fonts embedded in EMFSPOOL. An attacker on the guest can exploit this to cause a denial of service condition or the execution of arbitrary code on the host system. (CVE-2016-7083)
- A memory corruption issue exists in Cortado Thinprint due to improper handling of specially crafted JPEG2000 images. An attacker on the guest can exploit this to cause a denial of service condition or the execution of arbitrary code on the host system. (CVE-2016-7084)
- A flaw exits due to improper loading of some dynamic link library (DLL) files that allows an attacker to load a DLL file and thereby execute arbitrary code. (CVE-2016-7085)
- A flaw exists in the Workstation installer due to insecure loading of executables. An attacker can exploit this, via a crafted application named 'setup64.exe' inserted into the same directory as the installer, to execute arbitrary code. (CVE-2016-7086)
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://www.vmware.com/security/advisories/VMSA-2016-0014.html
* Platforms Affected: VMware Workstation prior to 12.5.0 Linux Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest versions of the affected applications(VMware Workstation 12.5.0 or later) available from the VMware Download Web site at http://www.vmware.com/download/ |
Related URL |
CVE-2016-7081,CVE-2016-7082,CVE-2016-7083,CVE-2016-7084,CVE-2016-7085,CVE-2016-7086 (CVE) |
Related URL |
92934,92935,92940,92941 (SecurityFocus) |
Related URL |
(ISS) |
|