--- This is a critical security advisory from VMware (VMSA) ---
Today, VMware has released the following new security advisory:
“VMSA-2018-0005 – VMware Workstation, and Fusion updates resolve use-after-free and integer-overflow vulnerabilities”
This documents the remediation of Critical and Important severity issues (CVE-2017-4949, and CVE-2017-4950).
Issues (a) CVE-2017-4949 is a use-after-free vulnerability in VMware NAT service which can be exploited when IPv6 mode is enabled. This issue is rated as critical and may allow a guest to execute code on the host.
Issue (b) CVE-2017-4950 is an integer-overflow vulnerability in VMware NAT service which can be exploited when IPv6 mode is enabled. This issue is rated as important and may lead to an out-of-bound read which can then be used to execute code on the host in conjunction with other issues.
IPv6 mode for VMNAT is not enabled by default. VMware Workstation 14.1.1, 12.5.9 and VMware Fusion 10.1.1, 8.5.10 resolve these issues.
We would like to thank WenQunWang of Tencent’s Xuanwu LAB for reporting these issues to us.
Please sign up to the Security-Announce mailing list to receive new and updated VMware Security Advisories.
Customers should review the security advisories and direct any questions to VMware Support.
The post New VMware Security Advisory VMSA-2018-0005 appeared first on VMware Security & Compliance Blog.