lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID:
 <SN1PR05MB1902811C4F2A4AF7787C8D5BB9270@SN1PR05MB1902.namprd05.prod.outlook.com>
Date: Tue, 7 Aug 2018 21:03:12 +0000
From: VMware Security Response Center <security@...are.com>
To: "bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com>,
  "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: New VMSA-2018-0019 - Horizon 6, 7, and Horizon Client for Windows
 updates address an out-of-bounds read vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----------------------------------------------------------------------
VMware Security Advisory

Advisory ID: VMSA-2018-0019
Severity:    Important
Synopsis:    Horizon 6, 7, and Horizon Client for Windows updates
             address an out-of-bounds read vulnerability
Issue date:  2018-08-07
Updated on:  2018-08-07 (Initial Advisory)
CVE number:  CVE-2018-6970


1. Summary

   Horizon 6, 7, and Horizon Client for Windows updates address an
   out-of-bounds read vulnerability

2. Relevant Releases

   VMware Horizon 6
   VMware Horizon 7
   VMware Horizon Client for Windows

3. Problem Description

   Horizon 6, 7, and Horizon Client for Windows contain an out-of-
   bounds read vulnerability in the Message Framework library.
   Successfully exploiting this issue may allow a less-privileged user
   to leak information from a privileged process running on a system
   where Horizon Connection Server, Horizon Agent or Horizon Client are
   installed.

   Note: This issue doesn’t apply to Horizon 6, 7 Agents installed on
   Linux systems or Horizon Clients installed on non-Windows systems.

   VMware would like to thank Steven Seeley (mr_me) of Source Incite
   working with Trend Micro's Zero Day Initiative for reporting this
   issue to us.

   The Common Vulnerabilities and Exposures project (cve.mitre.org) has
   assigned the identifier CVE-2018-6970 to this issue.

   Column 5 of the following table lists the action required to
   remediate the vulnerability in each release, if a solution is
   available.

   VMware        Product Running           Replace with/    Mitigation/
   Product       Version on      Severity  Apply patch      Workaround
   ===========   ======= ======= ========= =============    ==========
   Horizon 7      7.x.x  Windows Important     7.5.1           None
   Horizon 6      6.x.x  Windows Important     6.2.7           None
   Horizon Client 4.x.x  Windows Important     4.8.1           None
   for Windows    & prior

4. Solution

   Please review the patch/release notes for your product and
   version and verify the checksum of your downloaded file.

   VMware Horizon 7 version 7.5.1
   Downloads and Documentation:
   https://my.vmware.com/en/web/vmware/info/slug/
   desktop_end_user_computing/vmware_horizon/7_5

   VMware Horizon 6 version 6.2.7
   Downloads and Documentation:
   https://my.vmware.com/group/vmware/info?slug=
   desktop_end_user_computing/vmware_horizon/6_2

   VMware Horizon Client for Windows 4.8.1
   Downloads and Documentation:
   https://my.vmware.com/web/vmware/details?productId=
   578&downloadGroup=CART19FQ2_WIN_4_8_1


5. References

   https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6970
- -----------------------------------------------------------------------

6. Change log

   2018-08-07 VMSA-2018-0019
   Initial security advisory in conjunction with the release of VMware
   Horizon 6 version 6.2.7 and Horizon Client 4.8.1 on 2018-08-07
- -----------------------------------------------------------------------

7. Contact

   E-mail list for product security notifications and announcements:
   http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:

     security-announce at lists.vmware.com
     bugtraq at securityfocus.com
     fulldisclosure at seclists.org

   E-mail: security at vmware.com
   PGP key at: https://kb.vmware.com/kb/1055

   VMware Security Advisories
   http://www.vmware.com/security/advisories

   VMware Security Response Policy
   https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
   https://www.vmware.com/support/policies/lifecycle.html

   VMware Security & Compliance Blog
   https://blogs.vmware.com/security

   Twitter
   https://twitter.com/VMwareSRC

   Copyright 2018 VMware Inc.  All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.8.3 (Build 4028)
Charset: utf-8

wj8DBQFbagjVDEcm8Vbi9kMRAqkDAJ0amQwAS/4/EaV+vGVSk1Ape1e1pQCg8BYa
+gHvsQNiDQvJ825BxU16ayE=
=b2UO
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ