Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-4950 : What You Need to Know

Learn about CVE-2017-4950, an integer overflow vulnerability in VMware NAT service affecting Workstation Pro / Player and Fusion. Find out the impact, affected versions, and mitigation steps.

An integer overflow vulnerability in VMware NAT service affects VMware Workstation Pro / Player and Fusion.

Understanding CVE-2017-4950

What is CVE-2017-4950?

An integer overflow vulnerability in VMware NAT service in VMware Workstation and Fusion allows for potential execution of unauthorized code on the host system when IPv6 mode is activated.

The Impact of CVE-2017-4950

This vulnerability may lead to an out-of-bound read, enabling the execution of unauthorized code on the host system when combined with other existing issues. It's important to note that IPv6 mode for VMNAT is not enabled by default.

Technical Details of CVE-2017-4950

Vulnerability Description

The vulnerability arises due to an integer overflow in VMware NAT service when IPv6 mode is enabled, potentially leading to unauthorized code execution on the host system.

Affected Systems and Versions

        Workstation Pro / Player versions 14.x before 14.1.1 and 12.x before 12.5.9
        Fusion versions 10.x before 10.1.1 and 8.x before 8.5.10

Exploitation Mechanism

The exploit occurs when IPv6 mode is activated, allowing for an out-of-bound read and potential execution of unauthorized code on the host system.

Mitigation and Prevention

Immediate Steps to Take

        Disable IPv6 mode for VMNAT if not required
        Apply the necessary patches provided by VMware

Long-Term Security Practices

        Regularly update VMware products to the latest versions
        Implement network segmentation to minimize the impact of potential vulnerabilities

Patching and Updates

Ensure that VMware Workstation Pro / Player and Fusion are updated to versions that address the CVE-2017-4950 vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now