7.5
CVSSv2

CVE-2017-4901

Published: 08/06/2017 Updated: 12/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.9 | Impact Score: 6 | Exploitability Score: 3.1
VMScore: 757
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The drag-and-drop (DnD) function in VMware Workstation 12.x before version 12.5.4 and Fusion 8.x before version 8.5.5 has an out-of-bounds memory access vulnerability. This may allow a guest to execute code on the operating system that runs Workstation or Fusion.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware workstation 12.5.2

vmware workstation 12.5.3

vmware fusion 8.5.2

vmware fusion 8.5.1

vmware workstation 12.0.1

vmware workstation 12.0

vmware fusion 8.1.0

vmware fusion 8.0.2

vmware workstation 12.1

vmware workstation 12.1.1

vmware fusion 8.5.0

vmware fusion 8.1.1

vmware workstation 12.5

vmware workstation 12.5.1

vmware fusion 8.5.4

vmware fusion 8.5.3

vmware fusion 8.0.1

vmware fusion 8.0.0

Exploits

# VMware Escape Exploit VMware Escape Exploit before VMware WorkStation 1255 Host Target: Win10 x64 Compiler: VS2013 Test on VMware 1252 build-4638234 # Known issues * Failing to heap manipulation causes host process crash * Not quite elaborate because I'm not good at doing heap "fengshui" on winows LFH # FAQ * Q: Error in reboot vmw ...

Github Repositories

Resources About Dynamic Binary Instrumentation and Dynamic Binary Analysis

所有收集类项目 DBI 跟DBI(Dynamic Binary Instrumentation:动态二进制插桩)逆向有关的资源收集 English Version 目录 DynamoRIO DrMemory -> (1)工具 (2)文章 工具 (9) 新添加的 (3) 与其他工具交互 (1) DynamoRIO 文章 (4) 新添加 (6) 工具介绍 (2) Fuzzing IntelPin 工具 (19) 新添加的 (8) 其他工具交互

VMware Exploitation A collection of links related to VMware escape exploits Pull requests are welcome Follow @andreyknvl on Twitter to be notified of updates Research 2020 "Detailing Two VMware Workstation TOCTOU Vulnerabilities" by Reno Robert [article] "SpeedPwning VMware Workstation: Failing at Pwn2Own, but doing it fast" by Corentin Bayet and Bruno P

《Frida操作手册》 PS1:by : @hluwa @r0ysue PS2:所有讨论、更新、源码以及部分付费内容尽在【hook老法师】知识星球:tzsxqcom/MbIm2vR changelog: date log 2019-5-4 44 FRIDA脚本系列(四)更新篇:几个主要机制的大更新 2019-3-29 43 FRIDA脚本系列(三)超神篇:百度AI“调教”抖

《Frida操作手册》 PS:by : @hluwa @r0ysue changelog: date log 2019-5-4 44 FRIDA脚本系列(四)更新篇:几个主要机制的大更新 2019-3-29 43 FRIDA脚本系列(三)超神篇:百度AI“调教”抖音AI 2019-1-16 Brida操作指南 2019-1-11 42 FRIDA脚本系列(二)成长篇:动静态结合逆向WhatsApp 2019-1-9

EXP-401: Advanced Windows Exploitation - OSEE Certification This repository is dedicated to my self-study journey towards the Offensive Security Exploit Expert (OSEE) certification I am planning to attend the course in 2025 or 2026, and this is part of my preparation I believe in the power of open learning and therefore, I am sharing the materials that I am using for my studi

《FRIDA操作手册》by @hluwa @r0ysue

《Frida操作手册》 PS:by : @hluwa @r0ysue changelog: date log 2019-5-4 44 FRIDA脚本系列(四)更新篇:几个主要机制的大更新 2019-3-29 43 FRIDA脚本系列(三)超神篇:百度AI“调教”抖音AI 2019-1-16 Brida操作指南 2019-1-11 42 FRIDA脚本系列(二)成长篇:动静态结合逆向WhatsApp 2019-1-9