
=====================================================================

                               CERT-Renater

                   Note d'Information No. 2022/VULN440

_____________________________________________________________________

DATE                : 05/12/2022

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running VMware Tools for Windows versions
                                    prior to 12.1.5.

=====================================================================
https://www.vmware.com/security/advisories/VMSA-2022-0029.html
_____________________________________________________________________

Low


Advisory ID:     VMSA-2022-0029
CVSSv3 Range:    3.3
Issue Date:      2022-11-29
Updated On:      2022-11-29 (Initial Advisory)
CVE(s):          CVE-2022-31693

Synopsis:
VMware Tools for Windows update addresses a denial-of-service
vulnerability (CVE-2022-31693)


1. Impacted Products
VMware Tools for Windows


2. Introduction
A denial-of-service vulnerability in VMware Tools for Windows
was privately reported to VMware. Updates are available to
remediate this vulnerability in affected VMware products.


3. VMware Tools for Windows update addresses a denial-of-service
vulnerability (CVE-2022-31693)


Description

VMware Tools for Windows contains a denial-of-service vulnerability
in the VM3DMP driver. VMware has evaluated the severity of this
issue to be in the Low Severity Range with a maximum CVSSv3 base
score of 3.3.

Known Attack Vectors

A malicious actor with local user privileges in the Windows guest
OS, where VMware Tools is installed, can trigger a PANIC in the
VM3DMP driver leading to a denial-of-service condition in the
Windows guest OS.


Resolution

To remediate CVE-2022-31693 apply the patches listed in the
'Fixed Version' column of the 'Response Matrix' found below.



Workarounds

None.


Additional Documentation

None.

Notes

None.


Acknowledgements

VMware would like to thank Sergey Kornienko and Wei Lei of
PixiePoint Security for reporting this vulnerability to us.



Response Matrix

Product	Version   Running On   CVE Identifier    CVSSv3
Severity    Fixed Version    Workarounds    Additional Documentation

VMware Tools for Windows    12.x.y, 11.x.y and 10.x.y    Windows
CVE-2022-31693    3.3    Low    12.1.5    None    None


4. References

Fixed Version(s) and Release Notes:

VMware Tools for Windows 12.1.5

Downloads and Documentation:

https://customerconnect.vmware.com/downloads/info/slug/datacenter_cloud_infrastructure/vmware_tools/12_x

https://docs.vmware.com/en/VMware-Tools/12.1/rn/vmware-tools-1215-release-notes/index.html


Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31693


FIRST CVSSv3 Calculator:
CVE-2022-31693: 
https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L


5. Change Log
2022-11-29 VMSA-2022-0029
Initial security advisory.


6. Contact
E-mail list for product security notifications and announcements:

https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce


This Security Advisory is posted to the following lists:

security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org


E-mail: security@vmware.com

PGP key at:
https://kb.vmware.com/kb/1055


VMware Security Advisories
https://www.vmware.com/security/advisories


VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html


VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html


VMware Security & Compliance Blog
https://blogs.vmware.com/security


Twitter
https://twitter.com/VMwareSRC



Copyright 2022 VMware Inc. All rights reserved.


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================


