CVE-2017-4949

VMware Workstation and Fusion contain a use-after-free vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may allow a guest to execute code on the host. Note: IPv6 mode for VMNAT is not enabled by default.
References
Link Resource
http://www.securityfocus.com/bid/102489 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040161 Third Party Advisory VDB Entry
https://www.vmware.com/security/advisories/VMSA-2018-0005.html Patch Vendor Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-01-11 14:29

Updated : 2024-02-28 16:04


NVD link : CVE-2017-4949

Mitre link : CVE-2017-4949

CVE.ORG link : CVE-2017-4949


JSON object : View

Products Affected

vmware

  • fusion
  • workstation

apple

  • mac_os_x
CWE
CWE-416

Use After Free