First published: Tue Jan 10 2017(Updated: )
VMware Workstation and Fusion contain an integer overflow vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may lead to an out-of-bound read which can then be used to execute code on the host in conjunction with other issues. Note: IPv6 mode for VMNAT is not enabled by default.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Fusion Pro | >=8.0<8.5.10 | |
VMware Fusion Pro | >=10.0<10.1.1 | |
Apple iOS and macOS | ||
VMware Workstation and ESXi | >=12.0<12.5.9 | |
VMware Workstation and ESXi | >=14.0<14.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-4950 has been rated as important due to the potential for out-of-bound reads and code execution.
To remediate CVE-2017-4950, update VMware Fusion and Workstation to the latest version where the vulnerability has been addressed.
CVE-2017-4950 affects VMware Fusion versions from 8.0 to 10.1.1 and VMware Workstation versions from 12.0 to 14.1.1.
CVE-2017-4950 does not affect macOS Yosemite as it is not a vulnerable configuration.
IPv6 mode for VMNAT is not enabled by default, which reduces the risk associated with CVE-2017-4950 unless explicitly activated.