CVE-2017-4903
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
07/06/2017
Last modified:
20/04/2025
Description
VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have an uninitialized stack memory usage in SVGA. This issue may allow a guest to execute code on the host.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:vmware:workstation_player:*:*:*:*:*:*:*:* | 12.0.0 (including) | 12.5.5 (excluding) |
| cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:* | 12.0.0 (including) | 12.5.5 (excluding) |
| cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:5.5:1:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:5.5:2:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:5.5:3a:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:5.5:3b:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/97160
- http://www.securitytracker.com/id/1038148
- http://www.securitytracker.com/id/1038149
- http://www.vmware.com/security/advisories/VMSA-2017-0006.html
- http://www.securityfocus.com/bid/97160
- http://www.securitytracker.com/id/1038148
- http://www.securitytracker.com/id/1038149
- http://www.vmware.com/security/advisories/VMSA-2017-0006.html



