cnvd-2019-08856
Vulnerability from cnvd
Title
VMware Fusion虚拟机端远程代码执行漏洞
Description
VMware Fusion是VMware公司出品的一款适用于Mac操作系统的虚拟机软件。 VMware Fusion虚拟机端存在远程代码执行漏洞,攻击者可通过VMware Fusion在本地启动的WebSocket API接口在所有已安装VMware Tools的虚拟机上利用该漏洞执行任意代码。
Severity
Patch Name
VMware Fusion虚拟机端远程代码执行漏洞的补丁
Patch Description
VMware Fusion是VMware公司出品的一款适用于Mac操作系统的虚拟机软件。 VMware Fusion虚拟机端存在远程代码执行漏洞,攻击者可通过VMware Fusion在本地启动的WebSocket API接口在所有已安装VMware Tools的虚拟机上利用该漏洞执行任意代码。 目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: https://www.vmware.com/cn/products/fusion/fusion-evaluation.html

Reference
https://www.vmware.com/security/advisories/VMSA-2019-0005.html https://theevilbit.github.io/posts/vmware_fusion_11_guest_vm_rce_cve-2019-5514/ https://www.seebug.org/vuldb/ssvid-97891
Impacted products
Name
['VMWare Fusion 10.x', 'VMware Fusion 11.*']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2019-5514"
    }
  },
  "description": "VMware Fusion\u662fVMware\u516c\u53f8\u51fa\u54c1\u7684\u4e00\u6b3e\u9002\u7528\u4e8eMac\u64cd\u4f5c\u7cfb\u7edf\u7684\u865a\u62df\u673a\u8f6f\u4ef6\u3002\n\nVMware Fusion\u865a\u62df\u673a\u7aef\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u901a\u8fc7VMware Fusion\u5728\u672c\u5730\u542f\u52a8\u7684WebSocket API\u63a5\u53e3\u5728\u6240\u6709\u5df2\u5b89\u88c5VMware Tools\u7684\u865a\u62df\u673a\u4e0a\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
  "discovererName": "CodeColorist,Csaba Fitzl",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.vmware.com/cn/products/fusion/fusion-evaluation.html",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2019-08856",
  "openTime": "2019-04-02",
  "patchDescription": "VMware Fusion\u662fVMware\u516c\u53f8\u51fa\u54c1\u7684\u4e00\u6b3e\u9002\u7528\u4e8eMac\u64cd\u4f5c\u7cfb\u7edf\u7684\u865a\u62df\u673a\u8f6f\u4ef6\u3002\r\n\r\nVMware Fusion\u865a\u62df\u673a\u7aef\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u901a\u8fc7VMware Fusion\u5728\u672c\u5730\u542f\u52a8\u7684WebSocket API\u63a5\u53e3\u5728\u6240\u6709\u5df2\u5b89\u88c5VMware Tools\u7684\u865a\u62df\u673a\u4e0a\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\r\n\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "VMware Fusion\u865a\u62df\u673a\u7aef\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "VMWare  Fusion 10.x",
      "VMware Fusion 11.*"
    ]
  },
  "referenceLink": "https://www.vmware.com/security/advisories/VMSA-2019-0005.html\r\nhttps://theevilbit.github.io/posts/vmware_fusion_11_guest_vm_rce_cve-2019-5514/\r\nhttps://www.seebug.org/vuldb/ssvid-97891",
  "serverity": "\u9ad8",
  "submitTime": "2019-04-02",
  "title": "VMware Fusion\u865a\u62df\u673a\u7aef\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…