VMware Workstation and Fusion contain a use-after-free vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may allow a guest to execute code on the host. Note: IPv6 mode for VMNAT is not enabled by default.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/102489 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040161 | Third Party Advisory VDB Entry |
https://www.vmware.com/security/advisories/VMSA-2018-0005.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/102489 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040161 | Third Party Advisory VDB Entry |
https://www.vmware.com/security/advisories/VMSA-2018-0005.html | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 03:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/102489 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1040161 - Third Party Advisory, VDB Entry | |
References | () https://www.vmware.com/security/advisories/VMSA-2018-0005.html - Patch, Vendor Advisory |
Information
Published : 2018-01-11 14:29
Updated : 2024-11-21 03:26
NVD link : CVE-2017-4949
Mitre link : CVE-2017-4949
CVE.ORG link : CVE-2017-4949
JSON object : View
Products Affected
apple
- mac_os_x
vmware
- workstation
- fusion
CWE
CWE-416
Use After Free