### [CVE-2017-4924](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4924) ![](https://img.shields.io/static/v1?label=Product&message=ESXi&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Fusion&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Workstation&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=12.x%20before%2012.5.7%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.5%20without%20patch%20ESXi650-201707101-SG%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.x%20before%208.5.8%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Out-of-bounds%20write%20vulnerability&color=brightgreen) ### Description VMware ESXi (ESXi 6.5 without patch ESXi650-201707101-SG), Workstation (12.x before 12.5.7) and Fusion (8.x before 8.5.8) contain an out-of-bounds write vulnerability in SVGA device. This issue may allow a guest to execute code on the host. ### POC #### Reference - https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html #### Github - https://github.com/ARPSyndicate/cvemon