ID CVE-2017-4949
Summary VMware Workstation and Fusion contain a use-after-free vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may allow a guest to execute code on the host. Note: IPv6 mode for VMNAT is not enabled by default.
References
Vulnerable Configurations
  • cpe:2.3:a:vmware:fusion:8.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:8.5.9:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:8.5.9:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:10.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:10.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:10.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:10.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:fusion:10.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:fusion:10.1.0:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:12.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:12.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:12.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:12.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:12.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:12.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:12.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:12.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:12.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:12.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:12.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:12.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:12.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:12.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:12.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:12.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:12.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:12.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:12.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:12.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:12.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:12.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:12.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:12.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:12.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:12.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:12.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:12.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:12.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:14.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:14.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:14.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:14.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:vmware:workstation:14.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:vmware:workstation:14.1.0:*:*:*:*:*:*:*
CVSS
Base: 6.9 (as of 13-02-2018 - 00:34)
Impact:
Exploitability:
CWE CWE-416
CAPEC
Access
VectorComplexityAuthentication
LOCAL MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:M/Au:N/C:C/I:C/A:C
refmap via4
bid 102489
confirm https://www.vmware.com/security/advisories/VMSA-2018-0005.html
sectrack 1040161
Last major update 13-02-2018 - 00:34
Published 11-01-2018 - 14:29
Last modified 13-02-2018 - 00:34
Back to Top