CVE-2017-4933 Vulnerability Details

  /     /     /  

CVE-2017-4933 Metadata Quick Info

CVE Published: 20/12/2017 | CVE Updated: 16/09/2024 | CVE Year: 2017
Source: vmware | Vendor: VMware | Product: ESXi
Status : PUBLISHED

CVE-2017-4933 Description

VMware ESXi (6.5 before ESXi650-201710401-BG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a heap overflow via a specific set of VNC packets resulting in heap corruption. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine\'s .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID:
CWE Name: Heap overflow via authenticated VNC session
Source: VMware

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).