Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-78c8-742h-wm9w

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a use-after-free vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine.

VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a use-after-free vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine.

EPSS

Процентиль: 32%
0.00122
Низкий

Связанные уязвимости

CVSS3: 8.2
nvd
больше 5 лет назад

VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain a use-after-free vulnerability in the SVGA device. A malicious actor with local access to a virtual machine with 3D graphics enabled may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine.

CVSS3: 8.2
fstec
больше 5 лет назад

Уязвимость гипервизоров VMware ESXi, VMware Workstation и VMware Fusion, связанная с использованием памяти после ее освобождения при обработке команды SVGA DXInvalidateContext, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 32%
0.00122
Низкий