VMware Workstation 15.5.7 Pro | 19 November 2020 | Build 17171714

What's in the Release Notes

About VMware Workstation Pro

VMware Workstation Pro™ enables technical professionals to develop, test, demonstrate, and deploy software by running multiple x86-based Windows, Linux, and other operating systems simultaneously on the same PC.

You can replicate server, desktop, and tablet environments in a virtual machine and allocate multiple processor cores, gigabytes of main memory and graphics memory to each virtual machine, whether the virtual machine resides on a personal PC or on a private enterprise cloud.

For more information, see the VMware Workstation Pro documentation.

What's New

This release of VMware Workstation Pro is a free upgrade for all VMware Workstation 15 Pro users. It contains bug fixes and minor improvements.

Important Fixes

This release of VMware Workstation addresses the following issues:

  • VMware Workstation contains a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2020-4004 to this issue. See VMSA-2020-0026 for more information.

  • VMware Workstation contains an out-of-bounds read vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the VMX process. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2020-3981  to this issue. See VMSA-2020-0023.2  for more information.

  • VMware Workstation contains an out-of-bounds write vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this vulnerability to crash the virtual machine's VMX process or corrupt hypervisor's memory heap. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2020-3982  to this issue. See VMSA-2020-0023.2  for more information.

  • VMware Workstation contains multiple out-of-bounds read vulnerabilities in Cortado ThinPrint component. These issues exist in the EMF and JPEG2000 parsers. A malicious actor with normal access to a virtual machine may be able to exploit these issues to create a partial denial-of-service condition or to leak memory from TPView process running on the system where VMware Workstation is installed. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2020-3986 (EMF parser),  CVE-2020-3987 (EMR STRETCHDIBITS parser), and CVE-2020-3988 (JPEG2000 parser)  to these issues. See VMSA-2020-0020.1 for more information.

  • VMware Workstation contains a denial of service vulnerability due to an out-of-bounds write issue in Cortado ThinPrint component. A malicious actor with normal access to a virtual machine may be able to exploit this issue to create a partial denial-of-service condition on the system where VMware Workstation is installed. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2020-3989  to this issue. See VMSA-2020-0020.1 for more information.

  • VMware Workstation contains an information disclosure vulnerability due to an integer overflow issue in Cortado ThinPrint component. A malicious actor with normal access to a virtual machine may be able to exploit this issue to leak memory from TPView process running on the system where VMware Workstation is installed. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2020-3990 to this issue. See VMSA-2020-0020.1 for more information.

Prior Releases

Features and Known Issues from prior releases of VMware Workstation 15 Pro are described in the release notes for each release. To view the release notes for a prior release, click the appropriate link:

Resolved Issues

  • Not able to power on the virtual machine that is running on the old version of VMware Workstation or VMware ESXi Server by connecting to the server

    When connecting to old version of VMware Workstation or VMware ESXi Servers to power on a remoting virtual machine, the following error displays:

    Unable to connect to the MKS: vim.fault.GenericVmConfigFault.

    This issue is resolved.

  • The VMware Workstation shared virtual machine cannot work on the Ubuntu20.04 host

    The VMware Workstation UI crashed on the Ubuntu20.04 host when receiving remoting connection request to access the shared virtual machine.

    This issue is resolved.

check-circle-line exclamation-circle-line close-line
Scroll to top icon