CVE-2017-4941
20.12.2017, 15:29
VMware ESXi (6.0 before ESXi600-201711101-SG, 5.5 ESXi550-201709101-SG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a stack overflow via a specific set of VNC packets. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.Enginsight
Vendor | Product | Version |
---|---|---|
vmware | fusion | 8.0.0 ≤ 𝑥 < 8.5.9 |
vmware | workstation | 12.0.0 ≤ 𝑥 < 12.5.8 |
vmware | esxi | 5.5 |
vmware | esxi | 5.5:550-20170901001s |
vmware | esxi | 5.5:550-20170904001 |
vmware | esxi | 6.0 |
vmware | esxi | 6.0:1 |
vmware | esxi | 6.0:1a |
vmware | esxi | 6.0:1b |
vmware | esxi | 6.0:2 |
vmware | esxi | 6.0:3 |
vmware | esxi | 6.0:3a |
vmware | esxi | 6.0:600-201504401 |
vmware | esxi | 6.0:600-201505401 |
vmware | esxi | 6.0:600-201507101 |
vmware | esxi | 6.0:600-201507102 |
vmware | esxi | 6.0:600-201507401 |
vmware | esxi | 6.0:600-201507402 |
vmware | esxi | 6.0:600-201507403 |
vmware | esxi | 6.0:600-201507404 |
vmware | esxi | 6.0:600-201507405 |
vmware | esxi | 6.0:600-201507406 |
vmware | esxi | 6.0:600-201507407 |
vmware | esxi | 6.0:600-201509101 |
vmware | esxi | 6.0:600-201509102 |
vmware | esxi | 6.0:600-201509201 |
vmware | esxi | 6.0:600-201509202 |
vmware | esxi | 6.0:600-201509203 |
vmware | esxi | 6.0:600-201509204 |
vmware | esxi | 6.0:600-201509205 |
vmware | esxi | 6.0:600-201509206 |
vmware | esxi | 6.0:600-201509207 |
vmware | esxi | 6.0:600-201509208 |
vmware | esxi | 6.0:600-201509209 |
vmware | esxi | 6.0:600-201509210 |
vmware | esxi | 6.0:600-201510401 |
vmware | esxi | 6.0:600-201511401 |
vmware | esxi | 6.0:600-201601101 |
vmware | esxi | 6.0:600-201601102 |
vmware | esxi | 6.0:600-201601401 |
vmware | esxi | 6.0:600-201601402 |
vmware | esxi | 6.0:600-201601403 |
vmware | esxi | 6.0:600-201601404 |
vmware | esxi | 6.0:600-201601405 |
vmware | esxi | 6.0:600-201602401 |
vmware | esxi | 6.0:600-201603101 |
vmware | esxi | 6.0:600-201603102 |
vmware | esxi | 6.0:600-201603201 |
vmware | esxi | 6.0:600-201603202 |
vmware | esxi | 6.0:600-201603203 |
vmware | esxi | 6.0:600-201603204 |
vmware | esxi | 6.0:600-201603205 |
vmware | esxi | 6.0:600-201603206 |
vmware | esxi | 6.0:600-201603207 |
vmware | esxi | 6.0:600-201603208 |
vmware | esxi | 6.0:600-201605401 |
vmware | esxi | 6.0:600-201608101 |
vmware | esxi | 6.0:600-201608401 |
vmware | esxi | 6.0:600-201608402 |
vmware | esxi | 6.0:600-201608403 |
vmware | esxi | 6.0:600-201608404 |
vmware | esxi | 6.0:600-201608405 |
vmware | esxi | 6.0:600-201610410 |
vmware | esxi | 6.0:600-201611401 |
vmware | esxi | 6.0:600-201611402 |
vmware | esxi | 6.0:600-201611403 |
vmware | esxi | 6.0:600-201702101 |
vmware | esxi | 6.0:600-201702102 |
vmware | esxi | 6.0:600-201702201 |
vmware | esxi | 6.0:600-201702202 |
vmware | esxi | 6.0:600-201702203 |
vmware | esxi | 6.0:600-201702204 |
vmware | esxi | 6.0:600-201702205 |
vmware | esxi | 6.0:600-201702206 |
vmware | esxi | 6.0:600-201702207 |
vmware | esxi | 6.0:600-201702208 |
vmware | esxi | 6.0:600-201702209 |
vmware | esxi | 6.0:600-201702210 |
vmware | esxi | 6.0:600-201702211 |
vmware | esxi | 6.0:600-201702212 |
vmware | esxi | 6.0:600-201703401 |
vmware | esxi | 6.0:600-201706101 |
vmware | esxi | 6.0:600-201706102 |
vmware | esxi | 6.0:600-201706103 |
vmware | esxi | 6.0:600-201706401 |
vmware | esxi | 6.0:600-201706402 |
vmware | esxi | 6.0:600-201706403 |
vmware | esxi | 6.0:600-201710301 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration