First published: Thu Jun 08 2017(Updated: )
VMware Horizon View Client (2.x, 3.x and 4.x prior to 4.5.0) contains a command injection vulnerability in the service startup script. Successful exploitation of this issue may allow unprivileged users to escalate their privileges to root on the Mac OSX system where the client is installed.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Horizon | =2.0 | |
VMware Horizon | =2.1 | |
VMware Horizon | =2.2 | |
VMware Horizon | =2.3 | |
VMware Horizon | =3.0 | |
VMware Horizon | =3.1 | |
VMware Horizon | =3.2 | |
VMware Horizon | =3.3 | |
VMware Horizon | =4.0.0 | |
VMware Horizon | =4.0.1 | |
VMware Horizon | =4.1.0 | |
VMware Horizon | =4.2.0 | |
VMware Horizon | =4.3.0 | |
VMware Horizon | =4.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-4918 is classified as high due to its potential for privilege escalation.
To fix CVE-2017-4918, users should upgrade to VMware Horizon View Client version 4.5.0 or later.
CVE-2017-4918 is a command injection vulnerability that can allow unprivileged users to escalate privileges.
CVE-2017-4918 affects VMware Horizon View Client versions 2.x, 3.x, and 4.x prior to 4.5.0.
CVE-2017-4918 typically requires local access to the vulnerable system to exploit the command injection vulnerability.