VID |
23262 |
Severity |
30 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
VMware Workstation is one of the commercial software products that allow the creation and execution of multiple virtual computers simultaneously on the same system without having to reboot or partition the drive.
The version of VMware Workstation installed on the remote host is 12.x prior to 12.5.3. It is, therefore, affected by multiple vulnerabilities :
- A flaw exists in the vmware-vmx process when loading dynamic link library (DLL) files due to searching an insecure path, which was defined in a local environment variable. A local attacker can exploit this, via a specially crafted file injected into the path, to execute arbitrary code with SYSTEM privileges on the host. (CVE-2017-4898)
- An out-of-bounds read error exists in the SVGA driver due to improper validation of certain input. A local attacker can exploit this within a VM to crash it or to disclose sensitive memory contents. (CVE-2017-4899)
- A NULL pointer dereference flaw exists in the SVGA driver due to improper validation of certain input. A local attacker can exploit this within a VM to crash it. (CVE-2017-4900)
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.vmware.com/security/advisories/VMSA-2017-0003.html
* Platforms Affected: VMware Workstation prior to 12.5.3 Linux Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest versions of the affected applications(VMware Workstation 12.5.3 or later) available from the VMware Download Web site at http://www.vmware.com/download/ |
Related URL |
CVE-2017-4898,CVE-2017-4899,CVE-2017-4900 (CVE) |
Related URL |
96770,96771,96772 (SecurityFocus) |
Related URL |
(ISS) |
|