
====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN328
_____________________________________________________________________

DATE                : 18/06/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Windows running VMware Tools for Windows versions
                                  prior to 11.3.0.

=====================================================================
https://www.vmware.com/security/advisories/VMSA-2021-0011.html
_____________________________________________________________________


Advisory ID:      VMSA-2021-0011
CVSSv3 Range:     3.3
Issue Date:       2021-06-17
Updated On:       2021-06-17 (Initial Advisory)
CVE(s):           CVE-2021-21997


Synopsis:
VMware Tools for Windows update addresses a denial-of-service
vulnerability (CVE-2021-21997)


1. Impacted Products

    VMware Tools for Windows


2. Introduction

A denial-of-service vulnerability in VMware Tools for Windows was
privately reported to VMware. Updates are available to remediate this
vulnerability in affected VMware products.

3. VMware Tools for Windows update addresses a denial-of-service
vulnerability (CVE-2021-21997)

Description

VMware Tools for Windows contains a denial-of-service vulnerability in
the VM3DMP driver. VMware has evaluated the severity of this issue to be
in the Low severity range with a maximum CVSSv3 base score of 3.3.


Known Attack Vectors

A malicious actor with local user privileges in the Windows guest
operating system, where VMware Tools is installed, can trigger a PANIC
in the VM3DMP driver leading to a denial-of-service condition in the
Windows guest operating system.


Resolution

To remediate CVE-2021-21997 apply the patches listed in the 'Fixed
Version' column of the 'Response Matrix' found below.


Workarounds

None.


Additional Documentation

None.


Notes

None.


Acknowledgements

VMware would like to thank Honggang Ren from Codesafe Team of Legendsec
at Qi'anxin Group for reporting this vulnerability to us.


Response Matrix

Product 	Version 	Running On 	CVE Identifier 	CVSSv3 	Severity 	Fixed
Version 	Workarounds 	Additional Documentation

VMware Tools for Windows    11.x.y and prior    Windows
CVE-2021-21997    3.3    low    11.3.0    None    None


4. References

Fixed Version(s) and Release Notes:


VMware Tools for Windows 11.3.0

Downloads and Documentation:

https://my.vmware.com/en/group/vmware/downloads/details?downloadGroup=VMTOOLS1130&productId=1073

https://docs.vmware.com/en/VMware-Tools/11.3/rn/VMware-Tools-1130-Release-Notes.html


Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21997


FIRST CVSSv3 Calculator:
CVE-2021-21997:
https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L


5. Change Log

2021-06-17 VMSA-2021-0011
Initial security advisory.


6. Contact

E-mail list for product security notifications and announcements:
https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce


This Security Advisory is posted to the following lists:

security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org



E-mail: security@vmware.com

PGP key at:
https://kb.vmware.com/kb/1055


VMware Security Advisories
https://www.vmware.com/security/advisories


VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html


VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html


VMware Security & Compliance Blog
https://blogs.vmware.com/security


Twitter
https://twitter.com/VMwareSRC



Copyright 2021 VMware Inc. All rights reserved.

=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================



