Published on: 12 November 2018
VMware has published a security advisory to address an uninitialised stack memory vulnerability in the vmxnet3 virtual network adapter.
Successful exploitation of the vulnerabilities could lead to an information leak from host to guest, or allow a guest to execute code on the host.
The product vendor has released new versions to address the issue at the following website:
System administrators may contact their product support vendors for the fixes and assistance.
https://www.vmware.com/security/advisories/VMSA-2018-0027.html
https://www.hkcert.org/my_url/en/alert/18111201
https://www.us-cert.gov/ncas/current-activity/2018/11/09/VMware-Releases-Security-Updates
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6981
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6982