Lucene search

K
cvelistVmwareCVELIST:CVE-2017-4941
HistoryDec 19, 2017 - 12:00 a.m.

CVE-2017-4941

2017-12-1900:00:00
vmware
www.cve.org
2

8.9 High

AI Score

Confidence

High

0.023 Low

EPSS

Percentile

89.6%

VMware ESXi (6.0 before ESXi600-201711101-SG, 5.5 ESXi550-201709101-SG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a stack overflow via a specific set of VNC packets. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine’s .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.

CNA Affected

[
  {
    "product": "ESXi",
    "vendor": "VMware",
    "versions": [
      {
        "status": "affected",
        "version": "6.0 before ESXi600-201711101-SG"
      },
      {
        "status": "affected",
        "version": "5.5 ESXi550-201709101-SG"
      }
    ]
  },
  {
    "product": "Workstation",
    "vendor": "VMware",
    "versions": [
      {
        "status": "affected",
        "version": "12.x before 12.5.8"
      }
    ]
  },
  {
    "product": "Fusion",
    "vendor": "VMware",
    "versions": [
      {
        "status": "affected",
        "version": "8.x before 8.5.9"
      }
    ]
  }
]

8.9 High

AI Score

Confidence

High

0.023 Low

EPSS

Percentile

89.6%