[Security-announce] VMSA-2018-0030 VMware Workstation and Fusion updates address an integer overflow issue

VMware Security Announcements security-announce at lists.vmware.com
Thu Nov 22 18:12:15 PST 2018


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -----------------------------------------------------------------------

                               VMware Security Advisory

Advisory ID: VMSA-2018-0030
Severity:    Critical
Synopsis:    VMware Workstation and Fusion updates address
             an integer overflow issue.

Issue date:  2018-11-22
Updated on:  2018-11-22 (Initial Advisory)
CVE number:  CVE-2018-6983

1. Summary

   VMware Workstation and Fusion updates address an integer overflow
   issue.

2. Relevant Products

   VMware Workstation Pro / Player (Workstation)
   VMware Fusion Pro / Fusion (Fusion)

3. Problem Description

   VMware Workstation and Fusion virtual network devices integer
   overflow vulnerability.

   VMware Workstation and Fusion contain an integer overflow
   vulnerability in the virtual network devices. This issue may allow
   a guest to execute code on the host.

   VMware would like to thank Tianwen Tang of Qihoo 360Vulcan Team
   working with the Tianfu Cup 2018 International Pwn Contest for
   reporting this issue to us.

   The Common Vulnerabilities and Exposures project (cve.mitre.org) has
   assigned the identifier CVE-2018-6983 to this issue.

   Column 5 of the following table lists the action required to
   remediate the vulnerability in each release, if a solution is
   available.

   VMware      Product Running             Replace with/     Mitigation/
   Product     Version on     Severity     Apply patch       Workaround
   ==========  ======= ====== ========     =============     ===========
   Workstation 15.x    Any    Critical     15.0.2                None
   Workstation 14.x    Any    Critical     14.1.5                None
   Fusion      11.x    OS X   Critical     11.0.2                None
   Fusion      10.x    OS X   Critical     10.1.5                None

4. Solution

   Please review the patch/release notes for your product and
   version and verify the checksum of your downloaded file.

   VMware Workstation Pro 14.1.5, 15.0.2
   Downloads and Documentation:
   https://www.vmware.com/go/downloadworkstation
   https://docs.vmware.com/en/VMware-Workstation-Pro/index.html

   VMware Workstation Player 14.1.5, 15.0.2
   Downloads and Documentation:
   https://www.vmware.com/go/downloadplayer
   https://docs.vmware.com/en/VMware-Workstation-Player/index.html

   VMware Fusion Pro / Fusion 10.1.5, 11.0.2
   Downloads and Documentation:
   https://www.vmware.com/go/downloadfusion
   https://docs.vmware.com/en/VMware-Fusion/index.html


5. References

   https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6983

- - ------------------------------------------------------------------------

6. Change log

   VMSA-2018-0030 2018-11-22
   Initial security advisory in conjunction with the release of VMware
   Workstation 14.1.5, 15.0.2 and Fusion 10.1.5, 11.0.2 on 2018-11-22.

- - ------------------------------------------------------------------------
7. Contact

   E-mail list for product security notifications and announcements:
   https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

     security-announce at lists.vmware.com
     bugtraq at securityfocus.com
     fulldisclosure at seclists.org

   E-mail: security at vmware.com
   PGP key at: https://kb.vmware.com/kb/1055

   VMware Security Advisories
   https://www.vmware.com/security/advisories

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html

   VMware Security & Compliance Blog
   https://blogs.vmware.com/security

   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2018 VMware Inc.  All rights reserved.


-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.4.1 (Build 490)
Charset: utf-8

wj8DBQFb92HBDEcm8Vbi9kMRAn49AJ0RI5vbN9nBTO7xyKO7uuClnfObPwCeNGgQ
VOkDM6Ll/d0jp5IM3lgvpLQ=
=WvV1
-----END PGP SIGNATURE-----


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.vmware.com/pipermail/security-announce/attachments/20181123/663d91df/attachment.html>


More information about the Security-announce mailing list