Files
CVEs-PoC/2017/CVE-2017-4924.md
T
2025-09-29 21:09:30 +02:00

22 lines
1.2 KiB
Markdown

### [CVE-2017-4924](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4924)
![](https://img.shields.io/static/v1?label=Product&message=ESXi&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Fusion&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Workstation&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=12.x%20before%2012.5.7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.5%20without%20patch%20ESXi650-201707101-SG%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=8.x%20before%208.5.8%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Out-of-bounds%20write%20vulnerability&color=brightgreen)
### Description
VMware ESXi (ESXi 6.5 without patch ESXi650-201707101-SG), Workstation (12.x before 12.5.7) and Fusion (8.x before 8.5.8) contain an out-of-bounds write vulnerability in SVGA device. This issue may allow a guest to execute code on the host.
### POC
#### Reference
- https://0patch.blogspot.com/2017/10/micropatching-hypervisor-with-running.html
#### Github
- https://github.com/ARPSyndicate/cvemon