Multiple vulnerabilities have been found in VMware ESXi which may lead to information disclosure and arbitrary code execution.
PUBLISH DATE: 18-10-2018
VMware ESXi is found vulnerable to multiple vulnerabilities. These issues can be exploited by users with malicious intent in a guest virtual machine to reveal potentially sensitive or confidential information. An attacker can also use these errors to bypass certain security restrictions and execute arbitrary code.
An out-of-bounds read memory access can be caused when an error related to the SVGA device is exploited. This will lead to execution of arbitrary code with host privileges. Three versions of the VMware ESXi are reported as vulnerable.
CVE-2018-3646 affects systems with microprocessors utilizing speculative execution and address translations. Such systems if affected may reveal without authorization the information residing in the L1 data cache. The information can be used by an attacker using local user access with guest OS privilege via a terminal page fault and a side-channel analysis.
CVE-2018-6974 is a vulnerability that may allow a guest to execute a code on the host. VMware ESXi (6.7 before ESXi670-201810101-SG, 6.5 before ESXi650-201808401-BG, and 6.0 before ESXi600-201808401-BG), Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) are affected with this vulnerability, containing an out-of-bounds read vulnerability in SVGA device.
VMware ESXi 6.x
Apply the following patches for the following versions.
VMware ESXi version 6.7
Apply ESXi670-201810101-SG, ESXi670-201808401-BG, ESXi670-201808402-BG, and ESXi670-201808403-BG.
VMware ESXi version 6.5
Apply ESXi650-201808401-BG, ESXi650-201808402-BG, and ESXi650-201808403-BG.
VMware ESXi version 6.0
Apply ESXi600-201808401-BG, ESXi600-201808402-BG, and ESXi600-201808403-BG.