VMware Fusion 8.5.8 (for Intel-based Macs) File size: 467.19 MB. Information about MD5 checksums, and SHA1 checksums and SHA256 checksums. Performance cookies are used to analyze the user experience to improve our website by collecting and reporting information on how you use it. They allow us to know which pages are the most and least popular, see how visitors move around the site, optimize our website and make it easier to navigate.
Summary | |
---|---|
Title | VMware Workstation and Fusion updates address critical out-of-bounds memory access vulnerability |
Informations | |||
---|---|---|---|
Name | VMSA-2016-0019 | First vendor Publication | 2016-11-13 |
Vendor | VMware | Last vendor Modification | 2016-11-13 |
Severity (Vendor) | N/A | Revision | N/A |
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
a. VMware Workstation and Fusion out-of-bounds memory access The drag-and-drop (DnD) function in VMware Workstation and Fusion has an out-of-bounds memory access vulnerability. This may allow a guest to execute code on the operating system that runs Workstation or Fusion. Workaround On Workstation Pro and Fusion, the issue cannot be exploited if both the drag-and-drop function and the copy-and-paste (C&P) function are disabled. Refer to the Reference section on documentation how to disable these functions. This workaround is not available on Workstation Player. VMware would like to thank Qinghao Tang and Xinlei Ying from the 360 Marvel Team and lokihardt, all working with the organizers of PwnFest for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7461 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. |
Url : http://www.vmware.com/security/advisories/VMSA-2016-0019.html |
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
Type | Description | Count |
---|---|---|
Application |
| 7 |
Application |
| 7 |
Application |
| 6 |
Application |
| 6 |
Date | Description |
---|---|
2016-11-23 | Name : A virtualization application installed on the remote Mac OS X host is affecte... File : macosx_fusion_vmsa_2016_0019.nasl - Type : ACT_GATHER_INFO |
2016-11-23 | Name : A virtualization application installed on the remote Linux host is affected b... File : vmware_player_linux_vmsa_2016_0019.nasl - Type : ACT_GATHER_INFO |
2016-11-23 | Name : A virtualization application installed on the remote Windows host is affected... File : vmware_player_win_vmsa_2016_0019.nasl - Type : ACT_GATHER_INFO |
2016-11-23 | Name : A virtualization application installed on the remote Linux host is affected b... File : vmware_workstation_linux_vmsa_2016_0019.nasl - Type : ACT_GATHER_INFO |
2016-11-23 | Name : A virtualization application installed on the remote Windows host is affected... File : vmware_workstation_win_vmsa_2016_0019.nasl - Type : ACT_GATHER_INFO |
Date | Informations |
---|---|
2016-12-29 21:25:16 |
|
2016-12-29 13:22:01 |
|
2016-11-24 13:26:07 |
|
2016-11-14 09:23:52 |
|