Kaspersky ID:
KLA11018
Detect Date:
05/18/2017
Updated:
01/22/2024

Description

Multiple serious vulnerabilities have been found in VMware products. Malicious users can exploit these vulnerabilities to execute arbitrary code and cause a denial of service.

Below is a complete list of vulnerabilities:

  1. A heap-buffer overflow vulnerability can be exploited remotely to execute arbitrary code;
  2. Multiple heap buffer-overflow vulnerabilities in the TPView.dll can be exploited to execute arbitrary code or cause a denial of service;
  3. Multiple out-of-bounds read/write vulnerabilities in the TPView.dll can be exploited to execute arbitrary code or cause a denial of service;
  4. An integer overlow vulnerability in the TPView.dll can be exploited to execute arbitrary code or cause a denial of service;

Technical details

Vulnerability (1) exists in VMware Unified Access Gateway and VMware Horizon View.

Vulnerabilities (2),(3) are related to JPEG2000 and TTF (TrueType Font) parsers.

Exploitation of vulnerabilities (2),(3) is possibly only in case of virtual printing being enabled. Note that this product feature is enabled by default on VMware Horizon View and not enabled on VM Workstation products.

Vulnerabilities (2)-(4) exist in VMware Horizon View Client for Windows and VMware Workstation products.

Vulnerability (4) is related to TTF (TrueType Font) parser.

NB: At this moment VMware has just reserved CVE numbers for this vulnerabilities. Information can be changed soon.

Original advisories

Related products

CVE list

  • CVE-2017-4913
    high
  • CVE-2017-4912
    high
  • CVE-2017-4911
    high
  • CVE-2017-4910
    high
  • CVE-2017-4909
    high
  • CVE-2017-4908
    high
  • CVE-2017-4907
    critical

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.