VMSA-2018-0022:VMware Workstation and Fusion updates address an out-of-bounds write issue

VMware Tanzu Application Service

0 more products

23547

12 August 2018

12 August 2018

CLOSED

CRITICAL

CVE-2018-6973

VMSA-2018-0022

VMware Workstation and Fusion updates address an out-of-bounds  write issue

VMware Security Advisory
 
VMware Security Advisory Advisory ID:
 VMSA-2018-0022
VMware Security Advisory Severity:
 Critical
VMware Security Advisory Synopsis:
VMware Workstation and Fusion updates address an out-of-bounds write issue
VMware Security Advisory Issue date:
 2018-08-14
VMware Security Advisory Updated on:
 2018-08-14 (Initial Advisory)
VMware Security Advisory CVE numbers:
 CVE-2018-6973
 
1. Summary

VMware Workstation and Fusion updates address an out-of-bounds write issue

 
2. Relevant Products
  • VMware Workstation Pro / Player (Workstation)
  • VMware Fusion Pro, Fusion (Fusion)
 
3. Problem Description

Workstation and Fusion e1000 device out-of-bounds write vulnerability

VMware Workstation and Fusion contain an out-of-bounds write vulnerability in the e1000 device. This issue may allow a guest to execute code on the host.                             
  

VMware would like to thank Anonymous working with Trend Micro's Zero Day Initiative for reporting this issue to us.

 

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-6973 to this issue.


Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Mitigation/ Workaround
VMware ProductESXi
Product VersionAny
Running on Any
SeverityN/A
Replace with/ Apply Patchnot affected
Mitigation/ WorkaroundNone
VMware ProductWorkstation
Product Version14.x
Running on Any
SeverityCritical
Replace with/ Apply Patch14.1.3
Mitigation/ WorkaroundNone
VMware ProductFusion
Product Version10.x
Running on OS X
SeverityCritical
Replace with/ Apply Patch10.1.3
Mitigation/ WorkaroundNone

 

 

4. Solution

 

Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.

 

VMware Workstation Pro 14.1.3
Downloads and Documentation:
https://www.vmware.com/go/downloadworkstation
https://docs.vmware.com/en/VMware-Workstation-Pro/index.html

 

VMware Workstation Player 14.1.3   
Downloads and Documentation:
https://www.vmware.com/go/downloadplayer
https://docs.vmware.com/en/VMware-Workstation-Player/index.html
   
VMware Fusion Pro / Fusion 10.1.3
Downloads and Documentation:  
https://www.vmware.com/go/downloadfusion  
https://docs.vmware.com/en/VMware-Fusion/index.html   

 

  

6. Change log

 

2018-08-14  VMSA-2018-0022 
Initial security advisory in conjunction with the release of Workstation 14.1.3 and Fusion 10.1.3 on 2018-08-14.

 

7. Contact

 

E-mail list for product security notifications and announcements:

http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

 

This Security Advisory is posted to the following lists:

  [email protected]

  [email protected]

  [email protected]

 

E-mail: [email protected]

PGP key at:

https://kb.vmware.com/kb/1055

 

VMware Security Advisories

http://www.vmware.com/security/advisories

 

VMware Security Response Policy

https://www.vmware.com/support/policies/security_response.html

 

VMware Lifecycle Support Phases

https://www.vmware.com/support/policies/lifecycle.html

 

VMware Security & Compliance Blog  

https://blogs.vmware.com/security

 

Twitter

https://twitter.com/VMwareSRC

 

Copyright 2018 VMware Inc. All rights reserved.