VMware Patches Multiple Security Issues in Workstation

Exterminator

Community Manager
Thread author
Verified
Staff Member
Well-known
Oct 23, 2012
12,527
VMware fixed two bugs in its VMware Workstation late Thursday night, including an insecure library loading vulnerability and a NULL pointer dereference vulnerability.

The virtualization software company warned of the issues Thursday night in a security advisory VMSA-2017-0009.

Jann Horn, a security researcher for Google Project Zero who’s previously uncovered bugs in Xen’s hypervisor and the Linux kernel, found the library loading vulnerability in VMware’s Workstation Pro/Player product.

The vulnerability (CVE-2017-4915) is tied to the loading of Advanced Linux Sound Architecture (ALSA) files. ALSA, a software framework and part of the Linux kernel, facilitates APIs for sound card driver files. If an attacker exploited the issue successfully they could be able to escalate their privileges to root in a Linux host machine, the advisory warns.

The update also fixes a NULL pointer dereference vulnerability (CVE-2017-4916) in a virtual storage volume driver, vstor2. If exploited the bug, discovered by Borja Merino, a security researcher based in Spain, could allow host users with normal user privileges to trigger a denial of service in a Windows host machine.

VMware is urging customers to update to the most recent version, 12.5.6, to mitigate both issues.

It’s the ninth security advisory VMware has issued this year.

Last month the company fixed a remote code execution vulnerability in its vCenter Server platform that could have been exploited via BlazeDS.

It also fixed several critical vulnerabilities in its Unified Access Gateway, Horizon View and Workstation products. Most of those vulnerabilities stemmed from issues in Cortado ThinPrint, a protocol that compresses print data and exists in VMware’s Workstation and Horizon Client platforms. Attackers could have exploited the bugs via integer overflow and out of bounds read/write vulnerabilities in JPEG2000 and TrueType fonts.
 

Winter Soldier

Level 25
Verified
Top Poster
Well-known
Feb 13, 2017
1,486
In case of buffer overflow/underflow, it automatically leads to the execution of something not wanted and probably some crashes if it is not possible to check the arbitrary code execution.
"Null pointer" usually is not a serious vulnerability, but it may be the vector for most dangerous vulnerabilities.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top