VMware ESXi, Workstation, Fusion Affected by Critical Out-of-Bounds Read
#1
Quote:"The specific flaw exists within the handling of virtualized SVGA. The issue results from the lack of proper validation of user-supplied data, which can result in an overflow of a heap-based buffer," says the anonymous ZDI-18-1242 advisory. "An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the host OS."

The security issue can be exploited by attackers to compromise machines running the following vulnerable versions of VMWare's vSphere ESXi (6.7 before ESXi670-201810101-SG, 6.5 before ESXi650-201808401-BG, and 6.0 before ESXi600-201808401-BG), Workstation (Pro / Player) (14.x before 14.1.3) and VMware Fusion (Fusion Pro) (10.x before 10.1.3) products.

Detailed patch information and release notes for all updated products are listed on VMware's VMSA-2018-0026 security advisory page, together with severity ratings for all affected products.

Source: https://news.softpedia.com/news/vmware-e...3273.shtml
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread:
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Trying out EaseUS Video Downloader Pro
This is a very goo...masonwright757 — 14:26
Linux Restores Performance on Older PCs ...
Older PCs that str...harlan4096 — 13:05
AirVPN
AirVPN - Three new 1...jasonX — 04:24
ON1 Software
Get ON1 Effects 2025...jasonX — 04:23
GFYI [Official] Hasleo Disk Clone Profe...
mjcn19 Read https://...jasonX — 02:07

[-]
Birthdays
Today's Birthdays
avatar (44)tabthinLem
Upcoming Birthdays
avatar (50)theoldevext
avatar (45)algratCep
avatar (50)Qlaude2Sap
avatar (51)Josepharelf
avatar (40)kholukrefar
avatar (49)Lauraimike
avatar (51)WilsonWag
avatar (49)StevenPiole
avatar (40)zetssToomy
avatar (47)GornOr
avatar (50)Jamesmog
avatar (38)opeqyrav
avatar (38)ivanoFloom
avatar (41)uxegihor

[-]
Online Staff
There are no staff members currently online.

>