VMware Security Patches Released for Several Products

VMware released a security advisory on June 14, 2012 and patch for a variety of virtualization products. Details of the affected products and the vulnerabilities are below. You can download the ESX(i) patches from here.

VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
vCenter any Windows not affected
Workstation 8.x any 8.0.4 or later
Workstation 7.x any 7.1.6 or later
Player 4.x any 4.0.4 or later
Player 3.x any 3.1.6 or later
Fusion 4.x Mac OS/X 4.1.3 or later
ESXi 5.0 ESXi ESXi500-201206401-SG
ESXi 4.1 ESXi ESXi410-201206401-SG
ESXi 4.0 ESXi ESXi400-201206401-SG
ESXi 3.5 ESXi ESXe350-201206401-I-SG
ESX 4.1 ESX ESX410-201206401-SG
ESX 4.0 ESX ESX400-201206401-SG
ESX 3.5 ESX ESX350-201206401-SG

VMware Host Checkpoint File Memory CorruptionCertain input data is not properly validated when loading checkpoint files. This might allow an attacker with the ability to load a specially crafted checkpoint file to execute arbitrary code on the host.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-3288 to this issue.

The following workarounds and mitigating controls might be available to remove the potential for exploiting the issue and to reduce the exposure that the issue poses.

Workaround: None identified.
Mitigation: Do not import virtual machines from untrusted sources.

VMware Virtual Machine Remote Device Denial of Service
A device (for example CD-ROM or keyboard) that is available to a virtual machine while physically connected to a system that does not run the virtual machine is referred to as a remote device. Traffic coming from remote virtual devices is incorrectly handled. This might allow an attacker who is capable of manipulating the traffic from a remote virtual device to crash the virtual machine.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-3289 to this issue.

The following workarounds and mitigating controls might be available to remove the potential for exploiting the issue and to reduce the exposure that the issue poses.
Workaround: None identified.

Mitigation:

  • Users need administrative privileges on the virtual machine in order to attach remote devices.
  • Do not attach untrusted remote devices to a virtual machine.
Print Friendly, PDF & Email

Related Posts

Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments