VMware ESXi (ESXi 6.5 without patch ESXi650-201707101-SG), Workstation (12.x before 12.5.7) and Fusion (8.x before 8.5.8) contain an out-of-bounds write vulnerability in SVGA device. This issue may allow a guest to execute code on the host.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/100843 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039365 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039366 | Third Party Advisory VDB Entry |
https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html | Exploit Third Party Advisory |
https://www.vmware.com/security/advisories/VMSA-2017-0015.html | Vendor Advisory |
http://www.securityfocus.com/bid/100843 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039365 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039366 | Third Party Advisory VDB Entry |
https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html | Exploit Third Party Advisory |
https://www.vmware.com/security/advisories/VMSA-2017-0015.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/100843 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039365 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039366 - Third Party Advisory, VDB Entry | |
References | () https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html - Exploit, Third Party Advisory | |
References | () https://www.vmware.com/security/advisories/VMSA-2017-0015.html - Vendor Advisory |
03 Feb 2022, 19:44
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:vmware:workstation_pro:12.5.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:8.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:8.5.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:8.5.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:8.5.6:*:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:8.5.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:workstation_pro:12.5.6:*:*:*:*:*:*:* cpe:2.3:a:vmware:workstation_pro:12.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:workstation_pro:12.0.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:8.0.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:workstation_pro:12.1.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:workstation_pro:12.5.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:workstation_pro:12.1.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:8.5.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:workstation_pro:12.5.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:8.5.4:*:*:*:*:*:*:* cpe:2.3:a:vmware:workstation_pro:12.5.4:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:8.1.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:8.5.7:*:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:8.0.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:workstation_pro:12.5.3:*:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:8.5.0:*:*:*:*:*:*:* |
cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:* cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:* |
Information
Published : 2017-09-15 13:29
Updated : 2024-11-21 03:26
NVD link : CVE-2017-4924
Mitre link : CVE-2017-4924
CVE.ORG link : CVE-2017-4924
JSON object : View
Products Affected
vmware
- fusion
- workstation_pro
- esxi
CWE
CWE-787
Out-of-bounds Write