17 October 18, 13:11
Quote:"The specific flaw exists within the handling of virtualized SVGA. The issue results from the lack of proper validation of user-supplied data, which can result in an overflow of a heap-based buffer," says the anonymous ZDI-18-1242 advisory. "An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the host OS."
The security issue can be exploited by attackers to compromise machines running the following vulnerable versions of VMWare's vSphere ESXi (6.7 before ESXi670-201810101-SG, 6.5 before ESXi650-201808401-BG, and 6.0 before ESXi600-201808401-BG), Workstation (Pro / Player) (14.x before 14.1.3) and VMware Fusion (Fusion Pro) (10.x before 10.1.3) products.
Detailed patch information and release notes for all updated products are listed on VMware's VMSA-2018-0026 security advisory page, together with severity ratings for all affected products.
Source: https://news.softpedia.com/news/vmware-e...3273.shtml