==================================================================== CERT-Renater Note d'Information No. 2017/VULN056 _____________________________________________________________________ DATE : 14/03/2017 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running VMware Workstation Pro, VMware Player, VMware Fusion Pro, VMware Fusion. ===================================================================== http://lists.vmware.com/pipermail/security-announce/2017/000367.html ____________________________________________________________________ - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2017-0005 Severity: Critical Synopsis: VMware Workstation and Fusion updates address out-of-bounds memory access vulnerability Issue date: 2017-03-14 Updated on: 2017-03-14 (Initial Advisory) CVE number: CVE-2017-4901 1. Summary VMware Workstation and Fusion updates address critical out-of-bounds memory access vulnerability. 2. Relevant Products VMware Workstation Pro / Player VMware Fusion Pro / Fusion 3. Problem Description a. VMware Workstation and Fusion out-of-bounds memory access The drag-and-drop (DnD) function in VMware Workstation and Fusion has an out-of-bounds memory access vulnerability. This may allow a guest to execute code on the operating system that runs Workstation or Fusion. Workaround On Workstation Pro and Fusion, the issue cannot be exploited if both the drag-and-drop function and the copy-and-paste (C&P) function are disabled. Refer to the Reference section on documentation how to disable these functions. This workaround is not available on Workstation Player. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2017-4901 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation Product Version on Severity Apply patch Workaround =========== ======== ======== ======== ============= =========== Workstation 12.x Any Critical 12.5.4 Disable Pro DnD and C&P Workstation 12.x Any Critical 12.5.4 None Player Fusion Pro 8.x Mac OS X Critical 8.5.5 Disable Fusion DnD and C&P ESXi Any ESXi N/A Not affected N/A 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. VMware Workstation Pro 12.5.4 Downloads and Documentation: https://www.vmware.com/go/downloadworkstation https://www.vmware.com/support/pubs/ws_pubs.html VMware Workstation Player 12.5.4 Downloads and Documentation: https://www.vmware.com/go/downloadplayer https://www.vmware.com/support/pubs/player_pubs.html VMware Fusion Pro / Fusion 8.5.5 Downloads and Documentation: https://www.vmware.com/go/downloadfusion https://www.vmware.com/support/pubs/fusion_pubs.html 5. References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4901 Workaround documentation Workstation Pro: Disabling drag-and-drop and copy-and-paste functionality http://pubs.vmware.com/workstation-12/topic/com.vmware.ICbase/PDF/workstati on-pro-12-user-guide.pdf (page 81 and 82) Fusion: Disabling drag-and-drop and copy-and-paste functionality http://pubs.vmware.com/fusion-8/topic/com.vmware.ICbase/PDF/fusion-8-user-g uide.pdf (page 135) - ------------------------------------------------------------------------ 6. Change log 2017-03-14 VMSA-2017-0005 Initial security advisory in conjunction with the release of VMware Workstation Pro/Player 12.5.4 and VMware Fusion Pro, Fusion 8.5.5 on 2017-03-14 - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce@lists.vmware.com bugtraq@securityfocus.com fulldisclosure@seclists.org E-mail: security at vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html Twitter https://twitter.com/VMwareSRC Copyright 2017 VMware Inc. All rights reserved. ========================================================== Serveur de référence du CERT-Renater https://services.renater.fr/ssi/ ========================================================== + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: cert@support.renater.fr + ==========================================================