![]() Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC for Mac or Horizon Client for Mac is installed.įor VMware Fusion installed version 11.5.5 to mitigate the issue. ![]() Download links are listed below.įixed Version(s) and Release Notes: VMware Fusion 11.5.These release notes cover the following topics: To remediate the Horizon Client for Mac install version 5.4.3. Unmatched performance - The adaptive capabilities of the PCoIP display protocol and the VMware Blast display protocol are optimized to deliver the best user experience, even over low-bandwidth and high-latency connections.Support for Windows 10, Windows 8.1, and Windows 7.VMware Horizon Client for Windows makes it easy to access your remote desktops and published applications with the best possible user experience on the Local Area Network (LAN) or across a Wide Area Network (WAN). Secure from any location - At your desk or away from the office, your data is delivered securely to you wherever you are.Simple connectivity - Horizon Client for Windows is tightly integrated with VMware Horizon 6 and Horizon 7 for simple setup and connectivity.Your remote desktops and published applications are fast and responsive, regardless of where you are. SSL/TLS encryption is always used to protect user credentials, and enhanced certificate checking is performed on the client device. Horizon Client supports optional RADIUS and RSA SecurID authentication. ![]() You can also install Horizon Client so that it runs in FIPS mode. Horizon Client for Windows contains multiple out-of-bounds read vulnerabilities in the Cortado ThinPrint component.Horizon Client for Windows 5.5.2 includes various bug fixes and the following security fix and new features: Horizon Client for Windows 5.5.3 resolves CVE-2022-22938. For more information on this vulnerability and its impact on VMware products, see VMSA-2022-0002. These issues exist in the TTC and JPEG2000 parsers. A malicious actor with access to a remote desktop might be able to exploit these issues. The Common Vulnerabilities and Exposures project ( ) has assigned the identifiers CVE-2021-21987 (TTC parser), CVE-2021-21988 (JPEG2000 parser), and CVE-2021-21989 (TTC parser) to these issues. For more information, see VMSA-2021-0009.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |