{"id":211597,"date":"2018-11-10T19:52:25","date_gmt":"2018-11-10T18:52:25","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=211597"},"modified":"2022-09-30T14:43:39","modified_gmt":"2022-09-30T12:43:39","slug":"sicherheitsupdate-fr-vmware-workstation-pro-player","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/11\/10\/sicherheitsupdate-fr-vmware-workstation-pro-player\/","title":{"rendered":"Sicherheitsupdate f&uuml;r VMware Workstation Pro\/Player"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\"\/>VMware hat Sicherheitsupdates f\u00fcr seine Virtualisierungsprodukte&nbsp; VMware Workstation Pro, VMware Player sowie VMware ESXi und VMware Fusion herausgegeben. <\/p>\n<p><!--more--><\/p>\n<p>Im VMware Security Advisory <a href=\"https:\/\/web.archive.org\/web\/20210411085734\/https:\/\/www.vmware.com\/security\/advisories\/VMSA-2018-0027.html\" target=\"_blank\" rel=\"noopener\">VMSA-2018-0027<\/a> vom 9. November 2018 ist von kritischen Schwachstellen (CVE-2018-6981, CVE-2018-6982) die Rede. Die VMware ESXi, Workstation, und Fusion Updates adressieren eine 'uninitialized stack memory usage' Schwachstelle. Das betrifft die folgenden Produkte:<\/p>\n<ul>\n<li>VMware vSphere ESXi (ESXi)  <\/li>\n<li>VMware Workstation Pro \/ Player (Workstation)  <\/li>\n<li>VMware Fusion Pro, Fusion (Fusion)<\/li>\n<\/ul>\n<p>VMware ESXi, Fusion und Workstation enthalten eine nicht initialisierte Stack-Nutzung im virtuellen Netzwerkadapter <em>vmxnet3<\/em>. Diese Schwachstelle kann es einem Gast erm\u00f6glichen, Code auf dem Host auszuf\u00fchren. Das Problem liegt vor, wenn vmxnet3 aktiviert ist. Nicht vmxnet3 virtuelle Adapter sind von diesem Problem nicht betroffen.<\/p>\n<ul>\n<li>ESXi 6.7, Patch: ESXi670-201811401-BG<\/li>\n<li>ESXi 6.5, Patch ESXi650-201811301-BG<\/li>\n<li>ESXi 6.0, Patch ESXi600-201811401-BG<\/li>\n<li>Workstation 15.x, Patch 15.0.1<\/li>\n<li>Workstation 14.x, Patch 14.1.4<\/li>\n<li>Fusion 11.x (OS X), Patch 11.0.1<\/li>\n<li>Fusion 10.x (OS X), Patch 10.1.4<\/li>\n<\/ul>\n<p>Details finden sich auf <a href=\"https:\/\/web.archive.org\/web\/20210411085734\/https:\/\/www.vmware.com\/security\/advisories\/VMSA-2018-0027.html\" target=\"_blank\" rel=\"noopener\">dieser VMware-Seite<\/a>. Zudem haben <a href=\"https:\/\/web.archive.org\/web\/20181112194708\/https:\/\/news.softpedia.com\/news\/vmware-patches-critical-guest-to-host-escape-issue-in-esxi-workstation-fusion-523712.shtml\" target=\"_blank\" rel=\"noopener\">Softpedia<\/a> und <a href=\"https:\/\/www.deskmodder.de\/blog\/2018\/11\/10\/vmware-workstation-15-0-1-pro-und-player-behebt-schwachstelle\/\" target=\"_blank\" rel=\"noopener\">deskmodder.de<\/a> Beitr\u00e4ge zu diesem Update ver\u00f6ffentlicht. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>VMware hat Sicherheitsupdates f\u00fcr seine Virtualisierungsprodukte&nbsp; VMware Workstation Pro, VMware Player sowie VMware ESXi und VMware Fusion herausgegeben.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[185,14],"tags":[4328,4315,16],"class_list":["post-211597","post","type-post","status-publish","format-standard","hentry","category-update","category-virtualisierung","tag-sicherheit","tag-update","tag-vmware"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/211597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=211597"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/211597\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=211597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=211597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=211597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}