CVE-2017-4933
20.12.2017, 15:29
VMware ESXi (6.5 before ESXi650-201710401-BG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a heap overflow via a specific set of VNC packets resulting in heap corruption. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.Enginsight
Vendor | Product | Version |
---|---|---|
vmware | workstation_pro | 12.0.0 ≤ 𝑥 < 12.5.8 |
vmware | workstation_pro | 14.0 |
vmware | workstation_pro | 14.1.0 |
vmware | esxi | 6.5 |
vmware | esxi | 6.5:650-201701001 |
vmware | esxi | 6.5:650-201703001 |
vmware | esxi | 6.5:650-201703002 |
vmware | esxi | 6.5:650-201704001 |
vmware | esxi | 6.5:650-201707101 |
vmware | esxi | 6.5:650-201707102 |
vmware | esxi | 6.5:650-201707103 |
vmware | esxi | 6.5:650-201707201 |
vmware | esxi | 6.5:650-201707202 |
vmware | esxi | 6.5:650-201707203 |
vmware | esxi | 6.5:650-201707204 |
vmware | esxi | 6.5:650-201707205 |
vmware | esxi | 6.5:650-201707206 |
vmware | esxi | 6.5:650-201707207 |
vmware | esxi | 6.5:650-201707208 |
vmware | esxi | 6.5:650-201707209 |
vmware | esxi | 6.5:650-201707210 |
vmware | esxi | 6.5:650-201707211 |
vmware | esxi | 6.5:650-201707212 |
vmware | esxi | 6.5:650-201707213 |
vmware | esxi | 6.5:650-201707214 |
vmware | esxi | 6.5:650-201707215 |
vmware | esxi | 6.5:650-201707216 |
vmware | esxi | 6.5:650-201707217 |
vmware | esxi | 6.5:650-201707218 |
vmware | esxi | 6.5:650-201707219 |
vmware | esxi | 6.5:650-201707220 |
vmware | esxi | 6.5:650-201707221 |
vmware | esxi | 6.5:650-201710001 |
vmware | fusion | 8.0.0 ≤ 𝑥 < 8.5.9 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration