Vulnerability Name:

CVE-2017-4950 (CCN-137494)

Assigned:2016-12-26
Published:2018-01-10
Updated:2018-02-13
Summary:VMware Workstation and Fusion contain an integer overflow vulnerability in VMware NAT service when IPv6 mode is enabled. This issue may lead to an out-of-bound read which can then be used to execute code on the host in conjunction with other issues.
Note: IPv6 mode for VMNAT is not enabled by default.
CVSS v3 Severity:7.0 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
6.1 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
7.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-190
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2017-4950

Source: CCN
Type: SECTRACK ID: 1040161
VMware Workstation and Fusion Use-After-Free and Integer Overflow Lets Local Users on a Guest System Gain Elevated Privileges on the Host System

Source: BID
Type: Third Party Advisory, VDB Entry
102490

Source: CCN
Type: BID-102490
Multiple VMware Products CVE-2017-4950 Integer Overflow Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1040161

Source: XF
Type: UNKNOWN
vmware-cve20174950-integer-overflow(137494)

Source: CCN
Type: VMware Security Advisory VMSA-2018-0005
VMware Workstation, and Fusion updates resolve use-after-free and integer-overflow vulnerabilities

Source: CONFIRM
Type: Patch, Vendor Advisory
https://www.vmware.com/security/advisories/VMSA-2018-0005.html

Vulnerable Configuration:Configuration 1:
  • cpe:/a:vmware:fusion:*:*:*:*:*:*:*:* (Version >= 8.0 and < 8.5.10)
  • OR cpe:/a:vmware:fusion:*:*:*:*:*:*:*:* (Version >= 10.0 and < 10.1.1)
  • AND
  • cpe:/o:apple:mac_os_x:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:vmware:workstation:*:*:*:*:*:*:*:* (Version >= 12.0 and < 12.5.9)
  • OR cpe:/a:vmware:workstation:*:*:*:*:*:*:*:* (Version >= 14.0 and < 14.1.1)

  • Configuration CCN 1:
  • cpe:/a:vmware:workstation:12.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:workstation:14.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:fusion:10.0:*:*:*:*:*:*:*
  • OR cpe:/a:vmware:fusion:8.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    vmware fusion *
    vmware fusion *
    apple mac os x -
    vmware workstation *
    vmware workstation *
    vmware workstation 12.0
    vmware workstation 14.0
    vmware fusion 10.0
    vmware fusion 8.0