VMware Host Code Execution Vulnerabilities
VMware has released a security advisory document that includes three flaws that can be exploited by a malicious attacker to launch attacks against a number of VMware products.
The most severe relates to an out-of-bounds write vulnerability in super video graphics array. For this vulnerability to be exploited an attacker would need to gain low-level privileges on the guest Virtual Machine (VM).
The second vulnerability is a denial of service (DoS) type where an attacker with an unprivileged account on a guest operating system (OS) can cause the virtual environment to crash.
The final vulnerability is a stored cross-site scripting (XSS) flaw. This can be used as a privilege escalation attack.
Affected Platforms:
ESXi 5.5
ESXi 6.0
ESXi 6.5
vCenter Server 5.5
vCenter Server 6.0
vCenter Server 6.5
Fusion 8.x
Workstation 12.x
Resolution:
- Ensure patches are applied at the earliest available opportunity. Prioritise deployments where untrusted guests OS are in use.
- Where untrusted guests OS are in use, consider additional segregation from core network services.

Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.