VYPR
High severity8.8NVD Advisory· Published Jun 7, 2017· Updated May 13, 2026

CVE-2017-4903

CVE-2017-4903

Description

VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have an uninitialized stack memory usage in SVGA. This issue may allow a guest to execute code on the host.

Affected products

91
  • cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*
    Range: >=8.0.0,<8.5.6
  • cpe:2.3:a:vmware:fusion_pro:*:*:*:*:*:*:*:*
    Range: >=8.0.0,<8.5.6
  • cpe:2.3:a:vmware:workstation_player:*:*:*:*:*:*:*:*
    Range: >=12.0.0,<12.5.5
  • cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:*
    Range: >=12.0.0,<12.5.5
  • VMware/Esxi85 versions
    cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:*+ 84 more
    • cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:5.5:1:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:5.5:2:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:5.5:3a:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:5.5:3b:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*
    • (no CPE)range: 6.5 without patch ESXi650-201703410-SG
  • VMware/Fusion Pro / Fusionv5
    Range: 8.x prior to 8.5.6
  • VMware/Workstation Pro / Playerv5
    Range: 12.x prior to 12.5.5

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.