
====================================================================

                             CERT-Renater

                 Note d'Information No. 2020/VULN698
_____________________________________________________________________

DATE                : 18/12/2020

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running VMware ESXi versions prior to
                                  ESXi70U1c-17325551,
                     VMware Workstation versions prior to 16.0, 15.5.7,
                     VMware Fusion versions prior to 12.0, 11.5.7,
                     VMware Cloud Foundation versions 4.x.

=====================================================================
https://www.vmware.com/security/advisories/VMSA-2020-0029.html
_____________________________________________________________________


Advisory ID:       VMSA-2020-0029
CVSSv3 Range:      3.3
Issue Date:        2020-12-17
Updated On:        2020-12-17 (Initial Advisory)
CVE(s):            CVE-2020-3999
Synopsis:          VMware ESXi, Workstation, Fusion and Cloud Foundation
                   updates address a denial of service vulnerability
                   (CVE-2020-3999)


1. Impacted Products

    VMware ESXi
    VMware Workstation
    VMware Fusion
    VMware Cloud Foundation


2. Introduction

A denial of service vulnerability in VMware ESXi, Workstation and Fusion
was privately reported to VMware. Updates are available to address this
vulnerability in affected VMware products.

3a. Denial-of-Service Vulnerability due to improper input validation
(CVE-2020-3999)


Description

VMware ESXi, Workstation and Fusion contain a denial of service
vulnerability due to improper input validation in GuestInfo. VMware has
evaluated the severity of this issue to be in the Low severity range
with a maximum CVSSv3 base score of 3.3.

Known Attack Vectors

A malicious actor with normal user privilege access to a virtual machine
can crash the virtual machine's vmx process leading to a denial of
service condition.

Resolution

To remediate CVE-2020-3999 apply the patches listed in the 'Fixed
Version' column of the 'Response Matrix' found below.

Workarounds
None.

Additional Documentation
None.

Notes
None.

Acknowledgements

VMware would like to thank Lucas Leong (@_wmliang_) of Trend Micro Zero
Day Initiative and Murray McAllister of Insomnia Security - A CyberCX
Company for reporting this issue to us.

Response Matrix 3a:

Product 	Version 	Running On 	CVE Identifier 	CVSSv3 	Severity 	Fixed
Version 	Workarounds 	Additional Documentation

ESXi    7.0     Any     CVE-2020-3999     3.3     low
ESXi70U1c-17325551     None      None

ESXi     6.7     Any     CVE-2020-3999     N/A     N/A     Unaffected
	N/A      N/A

ESXi     6.5     Any     CVE-2020-3999     N/A     N/A     Unaffected
	N/A      N/A

Workstation     16.x     Any      CVE-2020-3999     3.3     low
	16.0     None      None

Workstation     15.x     Any      CVE-2020-3999     3.3     low
	15.5.7     None      None

Fusion     12.x       OS X       CVW-2020-3999      3.3     low
	12.0     None     None

Fusion     11.x     OS X     CVE-2020-3999     3.3     low     11.5.7
	None       None


Impacted Product Suites that Deploy Response Matrix 3a Components:

Product 	Version 	Running On 	CVE Identifier 	CVSSv3 	Severity 	Fixed
Version 	Workarounds 	Additional Documentation

Cloud Foundation (ESXi)     4.x     Any     CVE-2020-3999     3.3
	low     Patch pending     None     None

Cloud Foundation (ESXi)     3.x     Any     CVE-2020-3999     N/A
	N/A     Unaffected     N/A     N/A


4. References

VMware Patch Release ESXi 7.0 ESXi70U1c-17325551
https://my.vmware.com/group/vmware/patch
https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-esxi-70u1c.html


VMware Workstation Pro 16.0
Downloads and Documentation:
https://www.vmware.com/go/downloadworkstation
https://docs.vmware.com/en/VMware-Workstation-Pro/index.html


VMware Workstation Player 16.0
Downloads and Documentation:
https://www.vmware.com/go/downloadplayer
https://docs.vmware.com/en/VMware-Workstation-Player/index.htmlVMware


Workstation Pro 15.5.7
https://www.vmware.com/go/downloadworkstation
https://docs.vmware.com/en/VMware-Workstation-Pro/index.html


VMware Workstation Player 15.5.7
https://www.vmware.com/go/downloadplayer
https://docs.vmware.com/en/VMware-Workstation-Player/index.html


VMware Fusion 12.0
Downloads and Documentation:
https://www.vmware.com/go/downloadfusion
https://docs.vmware.com/en/VMware-Fusion/index.html


VMware Fusion 11.5.7
Downloads and Documentation:
https://www.vmware.com/go/downloadfusion
https://docs.vmware.com/en/VMware-Fusion/index.html


Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3999


FIRST CVSSv3 Calculator:

CVE-2020-3999 -
https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L


5. Change Log

2020-12-17: VMSA-2020-0029
Initial security advisory.


6. Contact

E-mail list for product security notifications and announcements:
https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce



This Security Advisory is posted to the following lists:

security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org


E-mail: security@vmware.com
PGP key at:
https://kb.vmware.com/kb/1055


VMware Security Advisories
https://www.vmware.com/security/advisories


VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html


VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html


VMware Security & Compliance Blog
https://blogs.vmware.com/security


Twitter
https://twitter.com/VMwareSRC



Copyright 2020 VMware Inc. All rights reserved.


=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================


