Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Multiple vulnerabilities have been found in VMware ESXi which may lead to information disclosure and arbitrary code execution.
IMPACT: MEDIUM
PUBLISH DATE: 18-10-2018
OVERVIEW
VMware ESXi is found vulnerable to multiple vulnerabilities. These issues can be exploited by users with malicious intent in a guest virtual machine to reveal potentially sensitive or confidential information. An attacker can also use these errors to bypass certain security restrictions and execute arbitrary code.
ANALYSIS
An out-of-bounds read memory access can be caused when an error related to the SVGA device is exploited. This will lead to execution of arbitrary code with host privileges. Three versions of the VMware ESXi are reported as vulnerable.
CVE-2018-3646 affects systems with microprocessors utilizing speculative execution and address translations. Such systems if affected may reveal without authorization the information residing in the L1 data cache. The information can be used by an attacker using local user access with guest OS privilege via a terminal page fault and a side-channel analysis.
CVE-2018-6974 is a vulnerability that may allow a guest to execute a code on the host. VMware ESXi (6.7 before ESXi670-201810101-SG, 6.5 before ESXi650-201808401-BG, and 6.0 before ESXi600-201808401-BG), Workstation (14.x before 14.1.3) and Fusion (10.x before 10.1.3) are affected with this vulnerability, containing an out-of-bounds read vulnerability in SVGA device.
AFFECTED PRODUCTS
VMware ESXi 6.x
UPDATES
Apply the following patches for the following versions.
VMware ESXi version 6.7
Apply ESXi670-201810101-SG, ESXi670-201808401-BG, ESXi670-201808402-BG, and ESXi670-201808403-BG.
VMware ESXi version 6.5
Apply ESXi650-201808401-BG, ESXi650-201808402-BG, and ESXi650-201808403-BG.
VMware ESXi version 6.0
Apply ESXi600-201808401-BG, ESXi600-201808402-BG, and ESXi600-201808403-BG.