Description
VMware ESXi (6.5 before ESXi650-201710401-BG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a heap overflow via a specific set of VNC packets resulting in heap corruption. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.
Published: 2017-12-20
Score: 8.8 High
EPSS: 7.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2017-14050 VMware ESXi (6.5 before ESXi650-201710401-BG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a heap overflow via a specific set of VNC packets resulting in heap corruption. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.
History

No history.

Subscriptions

Apple Mac Os X
Vmware Esxi Fusion Workstation Pro
cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2024-09-16T23:51:11.761Z

Reserved: 2016-12-26T00:00:00.000Z

Link: CVE-2017-4933

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-12-20T15:29:00.217

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-4933

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses