VMSA-2017-0005:VMware Workstation and Fusion updates address out-of-bounds memory access vulnerability

VMware

0 more products

23516

12 March 2017

12 March 2017

CLOSED

CRITICAL

CVE-2017-4901

VMSA-2017-0005

VMware Workstation and Fusion updates address out-of-bounds memory access vulnerability

VMware Security Advisory
 
VMware Security Advisory Advisory ID:
 VMSA-2017-0005
VMware Security Advisory Severity:
 Critical
VMware Security Advisory Synopsis:
 VMware Workstation and Fusion updates address critical out-of-bounds memory access vulnerability
VMware Security Advisory Issue date:
2017-03-14
VMware Security Advisory Updated on:
 2017-03-14 (Initial Advisory)
VMware Security Advisory CVE numbers:
CVE-2017-4901
 
1. Summary

VMware Workstation and Fusion updates address critical out-of-bounds memory access vulnerability.

 

2. Relevant Products
  • VMware Workstation Pro / Player
  • VMware Fusion Pro / Fusion
3. Problem Description

a. VMware Workstation and Fusion out-of-bounds memory access vulnerability

 

The drag-and-drop (DnD) function in VMware Workstation and Fusion has an out-of-bounds memory access vulnerability. This may allow a guest to execute code on the operating system that runs Workstation or Fusion.

 

Workaround
On Workstation Pro and Fusion, the issue cannot be exploited if both the drag-and-drop function and the copy-and-paste (C&P) function are disabled. Refer to the Reference section on documentation how to disable these functions. This workaround is not available on Workstation Player.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2017-4901 to this issue.  

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Mitigation/ Workaround
VMware ProductWorkstation Pro
Product Version12.x
Running on Any
SeverityCritical
Replace with/ Apply Patch12.5.4
Mitigation/ WorkaroundDisable DnD and C&P
VMware ProductWorkstation Player
Product Version12.x
Running on Any
SeverityCritical
Replace with/ Apply Patch12.5.4
Mitigation/ WorkaroundNone
VMware ProductFusion Pro, Fusion
Product Version8.x
Running on Mac OS X
SeverityCritical
Replace with/ Apply Patch8.5.5
Mitigation/ WorkaroundDisable DnD and C&P
VMware ProductESXi
Product VersionAny
Running on ESXi
SeverityN/A
Replace with/ Apply PatchNot affected
Mitigation/ WorkaroundN/A

 

 

4. Solution

 

Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.

VMware Workstation Pro 12.5.4 
Downloads and Documentation
https://www.vmware.com/go/downloadworkstation
https://www.vmware.com/support/pubs/ws_pubs.html


VMware Workstation Player 12.5.4
Downloads and Documentation
https://www.vmware.com/go/downloadplayer
https://www.vmware.com/support/pubs/player_pubs.html

VMware Fusion Pro / Fusion 8.5.5
Downloads and Documentation
https://www.vmware.com/go/downloadfusion

https://www.vmware.com/support/pubs/fusion_pubs.html

5. References
 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4901

 

Workaround documentation  


Workstation Pro
Disabling drag-and-drop and copy-and-paste functionality, page 81 and 82

http://pubs.vmware.com/workstation-12/topic/com.vmware.ICbase/PDF/workstation-pro-12-user-guide.pdf

Fusion
Disabling drag-and-drop and copy-and-paste functionality, page 135

http://pubs.vmware.com/fusion-8/topic/com.vmware.ICbase/PDF/fusion-8-user-guide.pdf

6. Change log

 

2017-03-14 VMSA-2017-0005
Initial security advisory in conjunction with the release of VMware Workstation Pro/Player 12.5.4 and VMware Fusion Pro, Fusion 8.5.5 on 2017-03-14

7. Contact

 

E-mail list for product security notifications and announcements:

http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

 

This Security Advisory is posted to the following lists:

[email protected]

[email protected]

[email protected]

 

E-mail: [email protected]

PGP key at:

https://kb.vmware.com/kb/1055

 

VMware Security Advisories

http://www.vmware.com/security/advisories

 

VMware Security Response Policy

https://www.vmware.com/support/policies/security_response.html

 

VMware Lifecycle Support Phases

https://www.vmware.com/support/policies/lifecycle.html

 

Twitter

https://twitter.com/VMwareSRC

 

Copyright 2017 VMware Inc. All rights reserved.