Vulnerability Details : CVE-2017-4904
The XHCI controller in VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 has uninitialized memory usage. This issue may allow a guest to execute code on the host. The issue is reduced to a Denial of Service of the guest on ESXi 5.5.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2017-4904
- cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:5.5:1:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:5.5:2:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:5.5:3a:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:5.5:3b:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation_player:*:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:fusion_pro:*:*:*:*:*:*:*:*
Threat overview for CVE-2017-4904
Top countries where our scanners detected CVE-2017-4904
Top open port discovered on systems with this issue
443
IPs affected by CVE-2017-4904 25,561
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2017-4904!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2017-4904
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-4904
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
2.0
|
6.0
|
NIST |
CWE ids for CVE-2017-4904
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-4904
-
http://www.securityfocus.com/bid/97165
Multiple VMware Products CVE-2017-4904 Local Memory Corruption VulnerabilityThird Party Advisory;VDB Entry
-
http://www.vmware.com/security/advisories/VMSA-2017-0006.html
VMSA-2017-0006Vendor Advisory
-
http://www.securitytracker.com/id/1038148
VMware Workstation/Fusion Buffer Overflow and Memory Initialization Errors Let Local Guest System Users Obtain Potentially Sensitive Information and Execute Arbitrary Code on the Host System - SecuritThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1038149
VMware ESXi Buffer Overflow and Memory Initialization Errors Let Local Guest System Users Obtain Potentially Sensitive Information and Execute Arbitrary Code on the Host System - SecurityTrackerThird Party Advisory;VDB Entry
Jump to