VMware ESXi 6.5 without patch ESXi650-201707101-SG, ESXi 6.0 without patch ESXi600-201706101-SG, ESXi 5.5 without patch ESXi550-201709101-SG, Workstation (12.x before 12.5.3), Fusion (8.x before 8.5.4) contain a NULL pointer dereference vulnerability. This issue occurs when handling guest RPC requests. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs.
Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
AV:L/AC:L/Au:N/C:N/I:N/A:P
This CVE is not in the KEV list.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
Vendors | Products |
---|---|
Apple |
|
Vmware |
|
Configuration 1 [-]
|
Configuration 2 [-]
|
Configuration 3 [-]
AND |
|
No data.
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: vmware
Published: 2017-09-15T13:00:00Z
Updated: 2024-09-17T03:03:34.620Z
Reserved: 2016-12-26T00:00:00
Link: CVE-2017-4925
Vulnrichment
No data.
NVD
Status : Modified
Published: 2017-09-15T13:29:00.243
Modified: 2024-11-21T03:26:40.853
Link: CVE-2017-4925
Redhat
No data.