

- #VMWARE HORIZON CLIENT 5.5 INSTALL#
- #VMWARE HORIZON CLIENT 5.5 WINDOWS 7#
- #VMWARE HORIZON CLIENT 5.5 WINDOWS#
Horizon Client for Windows supports the URL Content Redirection and HTML5 Multimedia Redirection features with the Microsoft Edge (Chromium) browser with VMware Horizon 7 version 7.13.1.For more information, see VMSA-2021-0009. The Common Vulnerabilities and Exposures project ( ) has assigned the identifiers CVE-2021-21987 (TTC parser), CVE-2021-21988 (JPEG2000 parser), and CVE-2021-21989 (TTC parser) to these issues. A malicious actor with access to a remote desktop might be able to exploit these issues. These issues exist in the TTC and JPEG2000 parsers. Horizon Client for Windows contains multiple out-of-bounds read vulnerabilities in the Cortado ThinPrint component.Horizon Client for Windows 5.5.2 includes various bug fixes and the following security fix and new features: Horizon Client for Windows 5.5.3 resolves CVE-2022-22938. For more information on this vulnerability and its impact on VMware products, see VMSA-2022-0002.
#VMWARE HORIZON CLIENT 5.5 INSTALL#
You can also install Horizon Client so that it runs in FIPS mode. Horizon Client supports optional RADIUS and RSA SecurID authentication.

SSL/TLS encryption is always used to protect user credentials, and enhanced certificate checking is performed on the client device.

#VMWARE HORIZON CLIENT 5.5 WINDOWS 7#
Support for Windows 10, Windows 8.1, and Windows 7.VMware Horizon Client for Windows makes it easy to access your remote desktops and published applications with the best possible user experience on the Local Area Network (LAN) or across a Wide Area Network (WAN). Successful exploitation of this issue may allow disclosure of internal domain names, the Connection Server’s internal name, or the gateway’s internal IP address.These release notes cover the following topics: VMware Horizon Connection Server (7.x before 7.8, 7.5.x before 7.5.2, 6.x before 6.2.8) contains an information disclosure vulnerability. Successful exploitation of this issue may allow an attacker to inject malicious script which will be executed. VMware Horizon Server (7.x prior to 7.10.3 or 7.13.0) contains a Cross Site Scripting (XSS) vulnerability. A malicious actor with access to a virtual machine or remote desktop may exploit this issue to trigger a denial-of-service condition in the Thinprint service running on the host machine where VMware Workstation or Horizon Client for Windows is installed. The issue exists in TrueType font parser. VMware Workstation (16.x prior to 16.2.2) and Horizon Client for Windows (5.x prior to 5.5.3) contains a denial-of-service vulnerability in the Cortado ThinPrint component. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.5. VMware Horizon Agent for Linux (prior to 22.x) contains a local privilege escalation that allows a user to escalate to root due to a vulnerable configuration file.ĮSXi, Workstation, Fusion, VMRC and Horizon Client contain a use-after-free vulnerability in the virtual sound device. Successful exploitation can result in linking to a root owned file. VMware Horizon Agent for Linux (prior to 22.x) contains a local privilege escalation as a user is able to change the default shared folder location due to a vulnerable symbolic link.
