The issue is new, different from the vulnerability in a guest virtual device driver that was patched by VMware earlier this week. That earlier flaw could cause a potential denial-of-service, and affected Workstation, Player, ACE, Server, ESX and ESXi virtualisation products.
One of the reasons this new vulnerability was labeled "critical" is that it could affect the underlying host operating system in a virtual environment.
“A critical vulnerability in the virtual machine display function might allow a guest operating system to run code on the host,” the VMware advisory said.
The VMware advisory lists a number of VMware versions that are affected, and whether the patches will properly address the vulnerability. But apparently, some users who have older versions may not be helped.
“Depending on your version, your only option may be to upgrade rather than patch,” wrote Steve Hall, handler at the SANS Internet Storm Center, on the organisation's blog.
The typical way to apply patches to ESXi hosts is through the VMware Update Manager, but ESXi hosts can also be updated by downloading a single offline download file, according to VMware.
See original article on scmagazineus.com
VMware patches new critical security vulnerability
VMware has issued patches for a critical security vulnerability in its ESX and ESXi virtualisation products.
Got a news tip for our journalists? Share it with us anonymously here.