![]() Workstation 12.x Any Critical 12.5.5 None Product Version on Severity Apply patch WorkaroundĮSXi 6.5 ESXi Critical ESXi650-201703410-SG NoneĮSXi 6.0 U3 ESXi Critical ESXi600-201703401-SG NoneĮSXi 6.0 U2* ESXi Critical KB 2149673 NoneĮSXi 6.0 U1* ESXi Critical KB 2149672 None VMware Product Running Replace with/ Mitigation Remediate the vulnerability in each release, if a solution is Note: ESXi 6.0 is affected by CVE-2017-4903 but not by CVE-2017-4902.Ĭolumn 5 of the following table lists the action required to The Common Vulnerabilities and Exposures project () hasĪssigned the identifiers CVE-2017-4902 (heap issue) andĬVE-2017-4903 (stack issue) to these issues. VMware would like to thank ZDI and Team 360 Security from Qihoo for Uninitialized stack memory usage in SVGA. ESXi, Workstation, Fusion SVGA memory corruptionĮSXi, Workstation, Fusion have a heap buffer overflow and VMware Workstation Pro / Player (Workstation)Ī. VMware ESXi, Workstation and Fusion updates address critical and ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |