High severity8.8NVD Advisory· Published Jun 7, 2017· Updated May 13, 2026
CVE-2017-4903
CVE-2017-4903
Description
VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have an uninitialized stack memory usage in SVGA. This issue may allow a guest to execute code on the host.
Affected products
91cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:*+ 84 more
- cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:5.5:1:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:5.5:2:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:5.5:3a:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:5.5:3b:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*
- (no CPE)range: 6.5 without patch ESXi650-201703410-SG
- VMware/Fusion Pro / Fusionv5Range: 8.x prior to 8.5.6
- VMware/Workstation Pro / Playerv5Range: 12.x prior to 12.5.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.vmware.com/security/advisories/VMSA-2017-0006.htmlnvdPatchVendor Advisory
- www.securityfocus.com/bid/97160nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1038148nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1038149nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.