VMSA-2016-0014:VMware ESXi, Workstation, Fusion, and Tools updates address multiple security issues

VMware

0 more products

23488

11 September 2016

11 September 2016

CLOSED

CRITICAL

CVE-2016-7081,CVE-2016-7082,CVE-2016-7083,CVE-2016-7084,CVE-2016-7079,CVE-2016-7080,CVE-2016-7085,CVE-2016-7086

VMSA-2016-0014.1

VMware ESXi, Workstation, Fusion, and Tools updates address multiple security issues

VMware Security Advisory
 
VMware Security Advisory Advisory ID:
VMSA-2016-0014.1
VMware Security Advisory Severity:
 Critical
VMware Security Advisory Synopsis:
 VMware ESXi, Workstation, Fusion, and Tools updates address multiple security issues
VMware Security Advisory Issue date:
 2016-09-13
VMware Security Advisory Updated on:
 2017-12-21
VMware Security Advisory CVE numbers:
 CVE-2016-7081, CVE-2016-7082, CVE-2016-7083, CVE-2016-7084, CVE-2016-7079, CVE-2016-7080, CVE-2016-7085, CVE-2016-7086
 
1. Summary

VMware ESXi, Workstation, Fusion, and Tools updates address multiple security issues

 
2. Relevant Products
  • ESXi
  • VMware Workstation Pro
  • VMware Workstation Player
  • VMware Fusion
  • VMware Tools
  •  
3. Problem Description

a. VMware Workstation heap-based buffer overflow vulnerabilities via Cortado ThinPrint 

 

VMware Workstation contains vulnerabilities that may allow a Windows-based Virtual Machine (VM) to trigger a heap-based buffer overflow. Exploitation of these issues may lead to arbitrary code execution in VMware Workstation running on Windows.

 

Exploitation is only possible if virtual printing has been enabled in VMware Workstation. This feature is not enabled by default. VMware Knowledge Base article 2146810 documents the procedure for enabling and disabling this feature.

 

VMware would like to thank E0DB6391795D7F629B5077842E649393 working with Trend Micro's Zero Day Initiative for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7081 to this issue.

 

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

 

VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Workaround
VMware ProductVMware Workstation Pro
Product Version12.x
Running on Windows
SeverityCritical
Replace with/ Apply Patch12.5.0
WorkaroundKB2146810
VMware ProductVMware Workstation Pro
Product Version12.x
Running on Linux
SeverityN/A
Replace with/ Apply Patchnot affected
WorkaroundN/A
VMware ProductVMware Workstation Player
Product Version12.x
Running on Windows
SeverityCritical
Replace with/ Apply Patch12.5.0
WorkaroundKB2146810
VMware ProductVMware Workstation Player
Product Version12.x
Running on Linux
SeverityN/A
Replace with/ Apply Patchnot affected
WorkaroundN/A

 

b. VMware Workstation memory corruption vulnerabilities via Cortado Thinprint      

 

VMware Workstation contains vulnerabilities that may allow a Windows-based virtual machine (VM) to corrupt memory. This includes TrueType fonts embedded in EMFSPOOL (CVE-2016-7083), and JPEG2000 images (CVE-2016-7084) in tpview.dll. Exploitation of these issues may lead to arbitrary code execution in VMware   Workstation running on Windows.

 

Exploitation is only possible if virtual printing has been enabled in VMware Workstation. This feature is not enabled by default. VMware Knowledge Base article 2146810 documents the procedure for enabling and disabling this feature.

 

VMware would like to thank Mateusz Jurczyk of Google's Project Zero for reporting these   issues to us.

 

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the   identifiers CVE-2016-7083, and CVE-2016-7084 to these issues. 

 

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Workaround
VMware ProductVMware Workstation Pro
Product Version12.x
Running on Windows
SeverityCritical
Replace with/ Apply Patch12.5.0
WorkaroundKB2146810
VMware ProductVMware Workstation Pro
Product Version12.x
Running on Linux
SeverityN/A
Replace with/ Apply Patchnot affected
WorkaroundN/A
VMware ProductVMware Workstation Player
Product Version12.x
Running on Windows
SeverityCritical
Replace with/ Apply Patch12.5.0
WorkaroundKB2146810
VMware ProductVMware Workstation Player
Product Version12.x
Running on Linux
SeverityN/A
Replace with/ Apply Patchnot affected
WorkaroundN/A

 

c. VMware Tools NULL pointer dereference vulnerabilities      

 

The graphic acceleration functions used in VMware Tools for OSX handle memory incorrectly. Two resulting NULL pointer dereference vulnerabilities may allow for local privilege escalation on Virtual Machines that run OSX.

 

The issues can be remediated by installing a fixed version of VMware Tools on affected OSX   VMs directly. Alternatively the fixed version of Tools can be installed through ESXi or Fusion after first updating to a version of ESXi or Fusion that ships with a fixed version of VMware Tools.

 

VMware would like to thank Dr. Fabien Duchene "FuzzDragon" and Jian Zhu for independently   reporting these issues to VMware.

 

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the   identifiers CVE-2016-7079 and CVE-2016-7080 to these issues.

 

Column 5 of the following table lists the action required to remediate the vulnerability in   each release, if a solution is available.

VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Workaround
VMware ProductVMware Tools
Product Version10.x, 9.x
Running on Windows
SeverityN/A
Replace with/ Apply Patchnot affected
WorkaroundN/A
VMware ProductVMware Tools
Product Version10.x, 9.x
Running on Linux
SeverityN/A
Replace with/ Apply Patchnot affected
WorkaroundN/A
VMware ProductVMware Tools
Product Version10.x, 9.x
Running on OSX
SeverityImportant
Replace with/ Apply Patch10.0.9*
WorkaroundNone

 

*VMware Tools 10.0.9 can be downloaded independently and is also included in the following:

  • ESXi 6.0 patch ESXi600-201608403-BG
  • ESXi 5.5 patch ESXi550-201608102-SG
  • Fusion 8.5.0

 

d. VMware Workstation installer DLL hijacking issue      

 

Workstation installer contains a DLL hijacking issue that exists due to some DLL files loaded by the application improperly. This issue may allow an attacker to load a DLL file of the attacker's choosing that could execute arbitrary code.

VMware would like to thank Stefan Kanthak, Anand Bhat, and Himanshu Mehta for independantly reporting this issue to us.

 

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7085 to this issue. 

 

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Workaround
VMware ProductVMware Workstation Pro
Product Version12.x
Running on Windows
SeverityImportant
Replace with/ Apply Patch12.5.0
WorkaroundNone
VMware ProductVMware Workstation Pro
Product Version12.x
Running on Linux
SeverityN/A
Replace with/ Apply Patchnot affected
WorkaroundN/A
VMware ProductVMware Workstation Player
Product Version12.x
Running on Windows
SeverityImportant
Replace with/ Apply Patch12.5.0
WorkaroundNone
VMware ProductVMware Workstation Player
Product Version12.x
Running on Linux
SeverityN/A
Replace with/ Apply Patchnot affected
WorkaroundN/A

 

e. VMware Workstation installer insecure executable loading vulnerability      

 

Workstation installer contains an insecure executable loading vulnerability that may allow an attacker to execute an exe file placed in the same directory as installer with the name "setup64.exe". Successfully exploiting this issue may allow attackers to execute arbitrary code.

 

VMware would like to thank Adam Bridge for reporting this issue to us.

 

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7086 to this issue.

 

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Workaround
VMware ProductVMware Workstation Pro
Product Version12.x
Running on Windows
SeverityImportant
Replace with/ Apply Patch12.5.0
WorkaroundNone
VMware ProductVMware Workstation Pro
Product Version12.x
Running on Linux
SeverityN/A
Replace with/ Apply Patchnot affected
WorkaroundN/A
VMware ProductVMware Workstation Player
Product Version12.x
Running on Windows
SeverityImportant
Replace with/ Apply Patch12.5.0
WorkaroundNone
VMware ProductVMware Workstation Player
Product Version12.x
Running on Linux
SeverityN/A
Replace with/ Apply Patchnot affected
WorkaroundN/A

 

f. Workstation EMF file handling memory corruption vulnerability via Cortado ThinPrint     

 

VMware Workstation contains a vulnerability that may allow a Windows-based virtual machine (VM) to corrupt memory. This issue occurs due to improper handling of EMF files in tpview.dll. Exploitation of this issue may lead to arbitrary code execution in the hypervisor OS. The severity of this issue has changed to Low from Critical as the    exploitation of the issue requires a custom registry value to be added on the host machine.
 
Exploitation is only possible if virtual printing has been enabled in VMware Workstation. This feature is not enabled by default. VMware Knowledge Base article 2146810 documents the procedure for enabling and disabling this feature.
  

VMware would like to thank Mateusz Jurczyk of Google's Project Zero and Yakun Zhang of McAfee for individually reporting this issue to us.

 

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7082 to this issue.

 

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Workaround
VMware ProductVMware Workstation Player
Product Version14.x
Running on Windows
SeverityLow
Replace with/ Apply Patch14.1.0
WorkaroundNone
VMware ProductVMware Workstation Player
Product Version14.x
Running on Linux
SeverityN/A
Replace with/ Apply Patchnot affected
WorkaroundN/A
VMware ProductVMware Workstation Pro
Product Version14.x
Running on Windows
SeverityLow
Replace with/ Apply Patch14.1.0
WorkaroundNone
VMware ProductVMware Workstation Pro
Product Version14.x
Running on Linux
SeverityN/A
Replace with/ Apply Patchnot affected
WorkaroundN/A
VMware ProductVMware Workstation Player
Product Version12.x
Running on Windows
SeverityLow
Replace with/ Apply Patchno patch planned
WorkaroundNone
VMware ProductVMware Workstation Player
Product Version12.x
Running on Linux
SeverityN/A
Replace with/ Apply Patchnot affected
WorkaroundN/A
VMware ProductVMware Workstation Pro
Product Version12.x
Running on Windows
SeverityLow
Replace with/ Apply Patchno patch planned
WorkaroundNone
VMware ProductVMware Workstation Pro
Product Version12.x
Running on Linux
SeverityN/A
Replace with/ Apply Patchnot affected
WorkaroundN/A

 

 

4. Solution

 

Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.

 

VMware ESXi 6.0

Downloads:

https://www.vmware.com/patchmgr/findPatch.portal

Documentation:

https://kb.vmware.com/kb/2145816

 

VMware ESXi 5.5

Downloads:

https://www.vmware.com/patchmgr/findPatch.portal

Documentation:

https://kb.vmware.com/kb/2144370

 

VMware Workstation Pro 12.5.0

Downloads and Documentation:

https://www.vmware.com/go/downloadworkstation

 

VMware Workstation Player 12.5.0

Downloads and Documentation:

https://www.vmware.com/go/downloadplayer

 

VMware Fusion 8.5.0

Downloads and Documentation:

https://www.vmware.com/go/downloadfusion

 

VMware Tools 10.0.9

Downloads and Documentation:

https://my.vmware.com/web/vmware/details?productId=491&downloadGroup=VMTOOLS1009

 

VMware Workstation Pro 14.1.0
Downloads and Documentation:
https://www.vmware.com/go/downloadworkstation
https://www.vmware.com/support/pubs/ws_pubs.html

 

VMware Workstation Player 14.1.0
Downloads and Documentation:
https://www.vmware.com/go/downloadplayer
https://www.vmware.com/support/pubs/player_pubs.html

 

 

6. Change log

 

2016-09-13 VMSA-2016-0014 Initial security advisory in conjunction with the release of VMware Workstation 12.5.0 on 2016-09-13.

 

2017-12-21 VMSA-2016-0014.1
Updated affected versions and resolution for CVE-2016-7082 and moved this CVE to its own section i.e. 3f.

 

7. Contact

 

E-mail list for product security notifications and announcements:

http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

 

This Security Advisory is posted to the following lists:

[email protected]

[email protected]

[email protected]

 

E-mail: [email protected]

PGP key at:

https://kb.vmware.com/kb/1055

 

VMware Security Advisories

http://www.vmware.com/security/advisories

 

VMware Security Response Policy

https://www.vmware.com/support/policies/security_response.html

 

VMware Lifecycle Support Phases

https://www.vmware.com/support/policies/lifecycle.html

 

Twitter

https://twitter.com/VMwareSRC

 

Copyright 2016 VMware Inc. All rights reserved.