CVE-2017-4933
Description
VMware ESXi (6.5 before ESXi650-201710401-BG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a heap overflow via a specific set of VNC packets resulting in heap corruption. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.
EPSS (Exploit Prediction Scoring System)
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score Trend (Last 90 Days)
Out-of-bounds Write
DraftCommon Consequences
Applicable Platforms
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*
Fusion by Vmware
cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*
Workstation Pro by Vmware
cpe:2.3:a:vmware:workstation_pro:14.1.0:*:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*
Workstation Pro by Vmware
cpe:2.3:a:vmware:workstation_pro:14.0:*:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*
Esxi by Vmware
cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*
Workstation Pro by Vmware
cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:*