First published: Wed Jun 07 2017(Updated: )
The XHCI controller in VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 has uninitialized memory usage. This issue may allow a guest to execute code on the host. The issue is reduced to a Denial of Service of the guest on ESXi 5.5.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Fusion Pro | >=8.0.0<8.5.6 | |
VMware Fusion Pro | >=8.0.0<8.5.6 | |
Apple iOS and macOS | ||
VMware Workstation Player | >=12.0.0<12.5.5 | |
VMware Workstation Pro | >=12.0.0<12.5.5 | |
VMware ESXi | =5.5 | |
VMware ESXi | =5.5-1 | |
VMware ESXi | =5.5-2 | |
VMware ESXi | =5.5-3a | |
VMware ESXi | =5.5-3b | |
VMware ESXi | =6.0 | |
VMware ESXi | =6.0-1 | |
VMware ESXi | =6.0-1a | |
VMware ESXi | =6.0-1b | |
VMware ESXi | =6.0-2 | |
VMware ESXi | =6.0-3 | |
VMware ESXi | =6.0-3a | |
VMware ESXi | =6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-4904 has a medium severity rating, potentially allowing for information disclosure or denial of service.
To remediate CVE-2017-4904, apply the appropriate patches provided by VMware for your specific product version.
CVE-2017-4904 affects VMware ESXi 5.5, 6.0, and 6.5, along with Workstation Pro/Player 12.x before version 12.5.5.
Currently, the best approach to mitigate CVE-2017-4904 is to ensure that you are using the patched versions of the affected VMware products.
Failing to address CVE-2017-4904 may expose your systems to potential exploitation, leading to unauthorized data access or service interruptions.