VMware Fusion 8.5.8 (for Intel-based Macs) File size: 467.19 MB. Information about MD5 checksums, and SHA1 checksums and SHA256 checksums. Performance cookies are used to analyze the user experience to improve our website by collecting and reporting information on how you use it. They allow us to know which pages are the most and least popular, see how visitors move around the site, optimize our website and make it easier to navigate.

  1. Vmware Fusion Pro 8.5.1 Download
  2. Vmware Fusion Pro Download

Executive Summary

Summary
TitleVMware Workstation and Fusion updates address critical out-of-bounds memory access vulnerability
Informations
NameVMSA-2016-0019First vendor Publication2016-11-13
VendorVMwareLast vendor Modification2016-11-13
Severity (Vendor)N/ARevisionN/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS ScoreNA
Base ScoreNAEnvironmental ScoreNA
impact SubScoreNATemporal ScoreNA
Exploitabality Sub ScoreNA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score7.2Attack RangeLocal
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vmware Fusion Pro 8.5.1

a. VMware Workstation and Fusion out-of-bounds memory access

The drag-and-drop (DnD) function in VMware Workstation and Fusion has an out-of-bounds memory access vulnerability. This may allow a guest to execute code on the operating system that runs Workstation or Fusion.

Workaround On Workstation Pro and Fusion, the issue cannot be exploited if both the drag-and-drop function and the copy-and-paste (C&P) function are disabled. Refer to the Reference section on documentation how to disable these functions. This workaround is not available on Workstation Player.

VMware would like to thank Qinghao Tang and Xinlei Ying from the 360 Marvel Team and lokihardt, all working with the organizers of PwnFest for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7461 to this issue.

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

Vmware Fusion Pro 8.5.1

Original Source

Url : http://www.vmware.com/security/advisories/VMSA-2016-0019.html

CWE : Common Weakness Enumeration

%IdName
100 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

Vmware

Vmware Fusion Pro 8.5.1 Download

TypeDescriptionCount
Application
  • Vmware Fusion
7
Application
  • Vmware Fusion Pro
7
Application
  • Vmware Workstation Player
6
Application
  • Vmware Workstation Pro
6

NessusĀ® Vulnerability Scanner

Vmware Fusion Pro Download

FusionVmware fusion pro 8.5.1 activation
DateDescription
2016-11-23Name : A virtualization application installed on the remote Mac OS X host is affecte...
File : macosx_fusion_vmsa_2016_0019.nasl - Type : ACT_GATHER_INFO
2016-11-23Name : A virtualization application installed on the remote Linux host is affected b...
File : vmware_player_linux_vmsa_2016_0019.nasl - Type : ACT_GATHER_INFO
2016-11-23Name : A virtualization application installed on the remote Windows host is affected...
File : vmware_player_win_vmsa_2016_0019.nasl - Type : ACT_GATHER_INFO
2016-11-23Name : A virtualization application installed on the remote Linux host is affected b...
File : vmware_workstation_linux_vmsa_2016_0019.nasl - Type : ACT_GATHER_INFO
2016-11-23Name : A virtualization application installed on the remote Windows host is affected...
File : vmware_workstation_win_vmsa_2016_0019.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
DateInformations
2016-12-29 21:25:16
  • Multiple Updates
2016-12-29 13:22:01
  • Multiple Updates
2016-11-24 13:26:07
  • Multiple Updates
2016-11-14 09:23:52
  • First insertion