Korean
<< Back
VID 23278
Severity 30
Port 139,445
Protocol TCP
Class SMB
Detailed Description VMware Player is one of the commercial software products that allow the creation and execution of multiple virtual computers simultaneously on the same system without having to reboot or partition the drive.

The version of VMware Player installed on the remote Windows host is 12.x prior to 12.5.8. It is, therefore, affected by multiple vulnerabilities that can allow code execution in a virtual machine via the authenticated VNC session as well as cause information disclosure from one virtual machine to another virtual machine on the same host.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
https://www.vmware.com/security/advisories/VMSA-2017-0021.html
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0368
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0369
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
https://meltdownattack.com/

* Platforms Affected:
VMware Player prior to 12.5.8
Linux Any version
Microsoft Windows Any version
Recommendation Upgrade to the latest versions of the affected applications(VMware Player 12.5.8 or later) available from the VMware Download Web site at http://www.vmware.com/download/
Related URL CVE-2017-4941,CVE-2017-4933,CVE-2017-5753,CVE-2017-5715 (CVE)
Related URL 102240,102238,102376,102371 (SecurityFocus)
Related URL (ISS)