Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
VMware ESXi (6.0 before ESXi600-201711101-SG, 5.5 ESXi550-201709101-SG), Workstation (12.x before 12.5.8), and Fusion (8.x before 8.5.9) contain a vulnerability that could allow an authenticated VNC session to cause a stack overflow via a specific set of VNC packets. Successful exploitation of this issue could result in remote code execution in a virtual machine via the authenticated VNC session. Note: In order for exploitation to be possible in ESXi, VNC must be manually enabled in a virtual machine's .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Vmware Workstation、ESXi和Fusion 缓冲区错误漏洞
Vulnerability Description
VMware ESXi、Workstation和Fusion都是美国威睿(VMware)公司的产品。VMware ESXi是一套可直接安装在物理服务器上的服务器虚拟化平台;VMware Workstation是一套虚拟机软件;Fusion是一套专用于在苹果机(Mac)上运行Windows应用程序的的虚拟机软件。 Vmware Workstation、ESXi和Fusion中存在堆溢出漏洞。远程攻击者可借助特制的VNC数据包利用该漏洞在虚拟机设备上执行任意代码。以下产品和版本受到影响:VMware ESXi
CVSS Information
N/A
Vulnerability Type
N/A