First published: Wed Jun 07 2017(Updated: )
VMware ESXi 6.5 without patch ESXi650-201703410-SG and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have a Heap Buffer Overflow in SVGA. This issue may allow a guest to execute code on the host.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation Player | >=12.0.0<12.5.5 | |
VMware Workstation Pro | >=12.0.0<12.5.5 | |
VMware ESXi | =5.5 | |
VMware ESXi | =5.5-1 | |
VMware ESXi | =5.5-2 | |
VMware ESXi | =5.5-3a | |
VMware ESXi | =5.5-3b | |
VMware ESXi | =6.5 | |
VMware ESXi | =6.5-650-201701001 | |
VMware ESXi | =6.5-650-201703001 | |
VMware ESXi | =6.5-650-201703002 | |
VMware Fusion Pro | >=8.0.0<8.5.6 | |
VMware Fusion Pro | >=8.0.0<8.5.6 | |
Apple iOS and macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-4902 is classified as critical due to the potential for guest code execution on the host.
To fix CVE-2017-4902, you should apply the appropriate patches: ESXi650-201703410-SG for ESXi 6.5 and ESXi550-201703401-SG for ESXi 5.5.
CVE-2017-4902 affects VMware ESXi versions 5.5 and 6.5, as well as VMware Workstation Pro/Player 12.x and Fusion Pro/Fusion 8.x prior to specified versions.
Yes, CVE-2017-4902 can potentially be exploited remotely by a malicious guest to execute arbitrary code on the host system.
CVE-2017-4902 is a heap buffer overflow vulnerability in the SVGA component of VMware products.