VID |
23277 |
Severity |
30 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
VMware Workstation is one of the commercial software products that allow the creation and execution of multiple virtual computers simultaneously on the same system without having to reboot or partition the drive.
The version of VMware Workstation installed on the remote Windows host is 14.x prior to 14.1.1. It is, therefore, missing security updates that add hypervisor-assisted guest remediation for a speculative execution vulnerability (CVE-2017-5715). These updates will allow guest operating systems to use hardware support for branch target mitigation and will require guest OS security updates as detailed in VMware Knowledge Base article 52085. It is also affected by use-after-free and integer-overflow vulnerabilities.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html https://www.vmware.com/security/advisories/VMSA-2018-0005.html https://kb.vmware.com/s/article/52085 https://spectreattack.com/
* Platforms Affected: VMware Workstation prior to 14.1.1 Linux Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest versions of the affected applications(VMware Workstation 14.1.1 or later) available from the VMware Download Web site at http://www.vmware.com/download/ |
Related URL |
CVE-2017-5715,CVE-2017-4949,CVE-2017-4950 (CVE) |
Related URL |
102376,102489,102490 (SecurityFocus) |
Related URL |
(ISS) |
|