VMware Horizon DaaS before 7.0.0 contains a vulnerability that exists due to insufficient validation of data. An attacker may exploit this issue by tricking DaaS client users into connecting to a malicious server and sharing all their drives and devices. Successful exploitation of this vulnerability requires a victim to download a specially crafted RDP file through DaaS client by clicking on a malicious link.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/96559 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037951 | |
http://www.vmware.com/security/advisories/VMSA-2017-0002.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/96559 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037951 | |
http://www.vmware.com/security/advisories/VMSA-2017-0002.html | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 03:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/96559 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1037951 - | |
References | () http://www.vmware.com/security/advisories/VMSA-2017-0002.html - Patch, Vendor Advisory |
Information
Published : 2017-05-31 14:29
Updated : 2024-11-21 03:26
NVD link : CVE-2017-4897
Mitre link : CVE-2017-4897
CVE.ORG link : CVE-2017-4897
JSON object : View
Products Affected
vmware
- horizon_daas
CWE
CWE-20
Improper Input Validation