VMware Workstation 15.x < 15.5.7 Use-after-free (VMSA-2020-0026)

high Nessus Plugin ID 143223

Synopsis

A virtualization application installed on the remote Windows host is affected by a use-after-free error.

Description

The version of VMware Workstation installed on the remote Windows host is 15.x prior to 15.5.7. It is, therefore, affected by a use-after-free error in the XHCI USB Controller. An unauthenticated, local attacker with administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

Note that Nessus has not tested for this issue, but has instead relied only on the application's self-reported version number.

Solution

Update to VMware Workstation version 15.5.7, 16, or later.

See Also

https://www.vmware.com/security/advisories/VMSA-2020-0026.html

Plugin Details

Severity: High

ID: 143223

File Name: vmware_workstation_vmsa_2020_0026.nasl

Version: 1.5

Type: local

Agent: windows, macosx, unix

Family: General

Published: 11/24/2020

Updated: 12/4/2020

Configuration: Enable paranoid mode

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.5

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.4

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2020-4004

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:vmware:workstation

Required KB Items: Settings/ParanoidReport, installed_sw/VMware Workstation

Exploit Ease: No known exploits are available

Patch Publication Date: 11/19/2020

Vulnerability Publication Date: 11/19/2020

Reference Information

CVE: CVE-2020-4004

IAVA: 2020-A-0544

VMSA: 2020-0026