Workstation and Fusion updates address a denial-of-service Vulnerabilities
運用環境でこの製品を使用していませんが、参考情報です。
VMSA-2018-0008
Workstation and Fusion updates address a denial-of-service vulnerability
VMware Security Advisory
Advisory ID:
VMSA-2018-0008
Severity:
Important
Synopsis:
Workstation and Fusion updates address a denial-of-service vulnerability
Issue date:
2018-03-15
Updated on:
2018-03-15 (Initial Advisory)
CVE numbers:
CVE-2018-6957
1. Summary
Workstation and Fusion updates address a denial-of-service vulnerability
2. Relevant Products
VMware Workstation Pro / Player (Workstation)
VMware Fusion Pro / Fusion (Fusion)
3. Problem Description
Denial-of-service vulnerability through VNC
VMware Workstation and Fusion contain a denial-of-service vulnerability which can be triggered by opening a large number of VNC sessions.
Note: In order for exploitation to be possible on Workstation and Fusion, VNC must be manually enabled.
VMware would like to thank Lilith Wyatt of Cisco Talos for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-6957 to this issue.
Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Mitigation/ Workaround
Workstation
14.x
Any
Important
14.1.1
None
Workstation
12.x
Any
Important
N/A
Fusion
10.x
OS X
Important
10.1.1
None
Fusion
8.x
OS X
Important
N/A
4. Solution
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware Workstation Pro 14.1.1
Downloads and Documentation:
https://www.vmware.com/go/downloadworkstation
https://www.vmware.com/support/pubs/ws_pubs.html
VMware Workstation Player 14.1.1
Downloads and Documentation:
https://www.vmware.com/go/downloadplayer
https://www.vmware.com/support/pubs/player_pubs.html
VMware Fusion Pro / Fusion 10.1.1
Downloads and Documentation:
https://www.vmware.com/go/downloadfusion
https://www.vmware.com/support/pubs/fusion_pubs.html
5. References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6957
https://kb.vmware.com/s/article/52934
6. Change log
2018-03-15 VMSA-2018-0008
Initial security advisory in conjunction with the release of VMware Workstation and Fusion Workaround KB on 2018-03-15.
7. Contact
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org
E-mail: security@vmware.com
PGP key at:
https://kb.vmware.com/kb/1055
VMware Security Advisories
http://www.vmware.com/security/advisories
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
VMware Security & Compliance Blog
https://blogs.vmware.com/security
Twitter
https://twitter.com/VMwareSRC
Copyright 2018 VMware Inc. All rights reserved.
VMSA-2018-0008
Workstation and Fusion updates address a denial-of-service vulnerability
VMware Security Advisory
Advisory ID:
VMSA-2018-0008
Severity:
Important
Synopsis:
Workstation and Fusion updates address a denial-of-service vulnerability
Issue date:
2018-03-15
Updated on:
2018-03-15 (Initial Advisory)
CVE numbers:
CVE-2018-6957
1. Summary
Workstation and Fusion updates address a denial-of-service vulnerability
2. Relevant Products
VMware Workstation Pro / Player (Workstation)
VMware Fusion Pro / Fusion (Fusion)
3. Problem Description
Denial-of-service vulnerability through VNC
VMware Workstation and Fusion contain a denial-of-service vulnerability which can be triggered by opening a large number of VNC sessions.
Note: In order for exploitation to be possible on Workstation and Fusion, VNC must be manually enabled.
VMware would like to thank Lilith Wyatt of Cisco Talos for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-6957 to this issue.
Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
VMware Product
Product Version
Running on
Severity
Replace with/ Apply Patch
Mitigation/ Workaround
Workstation
14.x
Any
Important
14.1.1
None
Workstation
12.x
Any
Important
N/A
Fusion
10.x
OS X
Important
10.1.1
None
Fusion
8.x
OS X
Important
N/A
4. Solution
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware Workstation Pro 14.1.1
Downloads and Documentation:
https://www.vmware.com/go/downloadworkstation
https://www.vmware.com/support/pubs/ws_pubs.html
VMware Workstation Player 14.1.1
Downloads and Documentation:
https://www.vmware.com/go/downloadplayer
https://www.vmware.com/support/pubs/player_pubs.html
VMware Fusion Pro / Fusion 10.1.1
Downloads and Documentation:
https://www.vmware.com/go/downloadfusion
https://www.vmware.com/support/pubs/fusion_pubs.html
5. References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6957
https://kb.vmware.com/s/article/52934
6. Change log
2018-03-15 VMSA-2018-0008
Initial security advisory in conjunction with the release of VMware Workstation and Fusion Workaround KB on 2018-03-15.
7. Contact
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org
E-mail: security@vmware.com
PGP key at:
https://kb.vmware.com/kb/1055
VMware Security Advisories
http://www.vmware.com/security/advisories
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
VMware Security & Compliance Blog
https://blogs.vmware.com/security
https://twitter.com/VMwareSRC
Copyright 2018 VMware Inc. All rights reserved.
Smart USB dongle Bluetooth comes with a bootloader to allow you to update the firmware or flash your own application to the dongle. easy to create BLE applications
返信削除