VMware released patches for serious vulnerabilities in several of its products that could lead to arbitrary code execution, privilege escalation on the host OS and denial of service.
VMware Workstation and Horizon View Client for the Windows platform had multiple memory manipulation issues that could allow a guest to execute code on the host OS or to trigger a denial-of-service condition. Workstation, Player, and Fusion also had a flaw that could enable a denial-of-service attack against the guest or host operating systems.
To address the code execution issue, VMware released Workstation 11.1.1 and 10.0.6; VMware Player 7.1.1 and 6.0.6; and Horizon Client for Windows 3.4.0, 3.2.1 and 5.4.2 (with local mode). The company also fixed the separate denial-of-service issue in VMware Workstation 10.0.5 and VMware Player 6.0.6 for all platforms and Fusion 7.0.1 and 6.0.6 for OS X.
A separate privilege escalation flaw was patched in VMware Workstation, Player and Horizon View Client for Windows that could allow local attackers to elevate their privileges and execute code in the context of the affected processes.
To be protected against this issue users are advised to update to VMware Workstation 11.1.1 or 10.0.7, Player 7.1.1 or 6.0.7, and VMware Horizon Client for Windows (with Local Mode Option) 5.4.2.
Find your next job with computerworld UK jobs