Home > Blogs > VMware Security & Compliance Blog > Monthly Archives: October 2016

Monthly Archives: October 2016

New VMware Security Advisory VMSA-2016-0017

Today VMware has released the following new security advisory:

VMSA-2016-0017 – VMware product updates address multiple information disclosure issues”

This addresses multiple information disclosure issues (CVE-2016-5328) in VMware Tools (versions 9.x and 10.x) running on Mac OS X VMs and (CVE-2016-5329) in VMware Fusion (versions 8.x).

Successful exploitation of these issues may allow a privileged local user on a system where System Integrity Protection (SIP) is enabled, to obtain kernel memory addresses to bypass the kASLR protection mechanism. SIP is default enabled in the latest versions of Mac OS X.

VMware would like to thank Marco Grassi (@marcograss) of KeenLab (@keen_lab), Tencent for reporting these issues to us.

Please sign up to the Security-Announce mailing list to receive new and updated VMware Security Advisories.

Customers should review the security advisories and direct any questions to VMware Support.

VMware Security Response Center and Certifications @ VMworld Barcelona

¡Visítenos en VMworld in Barcelona!

If you are at VMworld next week, come over to the VMware Security Response and Certification booth at the Solutions Exchange to hear how we keep customers safe. Also, in the same booth we have daily theater presentations on VMware Certifications and VMware Security Response Center.


Greetings from the VMware Security Response Center!

Today we released VMSA-2016-0016 which documents CVE-2016-7457 – a Critical severity issue in vRealize Operations (vROps).

Due to the severity of this issue we have released emergency patches to resolve the issue in the latest supported versions of the product. Generally speaking, privilege escalations would normally fall into the Important severity category but there is also the possibility that an attacker could stop and delete VMs unrelated to vROps so we rated this issue as Critical. In addition, the fix is scheduled to be rolled into the next release of vROps.

Thanks to Edgar Carvalho for reporting this issue to us. Edgar runs a blog over at http://vman.ch. Great find!

That’s it for now.

Drop us a line at security@vmware.com if you have any questions on the vulnerability or advisory.

VMware Security Advisory VMSA-2016-0015

Greetings from the VMware Security Response Center!

Today we released VMSA-2016-0015 which documents an Important severity issue in VMware Horizon View.

During internal discussions the most common question I have been asked about CVE-2016-7087 is why the issue has been classified as Important rather than Critical. The reason for this is after thorough investigation, it was determined that information you can pull off of the server doesn’t seem to be particularly sensitive. That being said, this is still unintended behavior of our product and so we strongly recommend updating to fixed versions listed in our VMSA.

We also wanted to mention Mike Arnold (Bruk0ut) working with Trend Micro’s Zero Day Initiative for responsibly disclosing this issue to us. Thanks Mike!

That’s it for this week. Stay tuned.

Drop us a line at security@vmware.com if you have any questions.