CVE-2017-4941

VMware ESXi (6.0 before ESXi600-201711101-SG, 5.5 ESXi550-201709101-SG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a stack overflow via a specific set of VNC packets. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
vmwareCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
VendorProductVersion
vmwarefusion
8.0.0 ≤
𝑥
< 8.5.9
vmwareworkstation
12.0.0 ≤
𝑥
< 12.5.8
vmwareesxi
5.5
vmwareesxi
5.5:550-20170901001s
vmwareesxi
5.5:550-20170904001
vmwareesxi
6.0
vmwareesxi
6.0:1
vmwareesxi
6.0:1a
vmwareesxi
6.0:1b
vmwareesxi
6.0:2
vmwareesxi
6.0:3
vmwareesxi
6.0:3a
vmwareesxi
6.0:600-201504401
vmwareesxi
6.0:600-201505401
vmwareesxi
6.0:600-201507101
vmwareesxi
6.0:600-201507102
vmwareesxi
6.0:600-201507401
vmwareesxi
6.0:600-201507402
vmwareesxi
6.0:600-201507403
vmwareesxi
6.0:600-201507404
vmwareesxi
6.0:600-201507405
vmwareesxi
6.0:600-201507406
vmwareesxi
6.0:600-201507407
vmwareesxi
6.0:600-201509101
vmwareesxi
6.0:600-201509102
vmwareesxi
6.0:600-201509201
vmwareesxi
6.0:600-201509202
vmwareesxi
6.0:600-201509203
vmwareesxi
6.0:600-201509204
vmwareesxi
6.0:600-201509205
vmwareesxi
6.0:600-201509206
vmwareesxi
6.0:600-201509207
vmwareesxi
6.0:600-201509208
vmwareesxi
6.0:600-201509209
vmwareesxi
6.0:600-201509210
vmwareesxi
6.0:600-201510401
vmwareesxi
6.0:600-201511401
vmwareesxi
6.0:600-201601101
vmwareesxi
6.0:600-201601102
vmwareesxi
6.0:600-201601401
vmwareesxi
6.0:600-201601402
vmwareesxi
6.0:600-201601403
vmwareesxi
6.0:600-201601404
vmwareesxi
6.0:600-201601405
vmwareesxi
6.0:600-201602401
vmwareesxi
6.0:600-201603101
vmwareesxi
6.0:600-201603102
vmwareesxi
6.0:600-201603201
vmwareesxi
6.0:600-201603202
vmwareesxi
6.0:600-201603203
vmwareesxi
6.0:600-201603204
vmwareesxi
6.0:600-201603205
vmwareesxi
6.0:600-201603206
vmwareesxi
6.0:600-201603207
vmwareesxi
6.0:600-201603208
vmwareesxi
6.0:600-201605401
vmwareesxi
6.0:600-201608101
vmwareesxi
6.0:600-201608401
vmwareesxi
6.0:600-201608402
vmwareesxi
6.0:600-201608403
vmwareesxi
6.0:600-201608404
vmwareesxi
6.0:600-201608405
vmwareesxi
6.0:600-201610410
vmwareesxi
6.0:600-201611401
vmwareesxi
6.0:600-201611402
vmwareesxi
6.0:600-201611403
vmwareesxi
6.0:600-201702101
vmwareesxi
6.0:600-201702102
vmwareesxi
6.0:600-201702201
vmwareesxi
6.0:600-201702202
vmwareesxi
6.0:600-201702203
vmwareesxi
6.0:600-201702204
vmwareesxi
6.0:600-201702205
vmwareesxi
6.0:600-201702206
vmwareesxi
6.0:600-201702207
vmwareesxi
6.0:600-201702208
vmwareesxi
6.0:600-201702209
vmwareesxi
6.0:600-201702210
vmwareesxi
6.0:600-201702211
vmwareesxi
6.0:600-201702212
vmwareesxi
6.0:600-201703401
vmwareesxi
6.0:600-201706101
vmwareesxi
6.0:600-201706102
vmwareesxi
6.0:600-201706103
vmwareesxi
6.0:600-201706401
vmwareesxi
6.0:600-201706402
vmwareesxi
6.0:600-201706403
vmwareesxi
6.0:600-201710301
𝑥
= Vulnerable software versions