cve/2017/CVE-2017-4901.md

47 lines
2.0 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-4901](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4901)
![](https://img.shields.io/static/v1?label=Product&message=Fusion%20Pro%20%2F%20Fusion&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Workstation%20Pro%2FPlayer&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20code%20execution&color=brighgreen)
### Description
The drag-and-drop (DnD) function in VMware Workstation 12.x before version 12.5.4 and Fusion 8.x before version 8.5.5 has an out-of-bounds memory access vulnerability. This may allow a guest to execute code on the operating system that runs Workstation or Fusion.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0x1BE/OSEE-Prep
- https://github.com/1o24er/RedTeam
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/Red-Team
- https://github.com/Apri1y/Red-Team-links
- https://github.com/BLACKHAT-SSG/Vmware-Exploitation
- https://github.com/Echocipher/Resource-list
- https://github.com/Neo01010/frida-all-in-one
- https://github.com/Ondrik8/RED-Team
- https://github.com/PwnAwan/Vmware-Exploitation
- https://github.com/WinMin/awesome-vm-exploit
- https://github.com/dk47os3r/hongduiziliao
- https://github.com/hasee2018/Safety-net-information
- https://github.com/hookmaster/frida-all-in-one
- https://github.com/hudunkey/Red-Team-links
- https://github.com/john-80/-007
- https://github.com/landscape2024/RedTeam
- https://github.com/lnick2023/nicenice
- https://github.com/lp008/Hack-readme
- https://github.com/nobiusmallyu/kehai
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/slimdaddy/RedTeam
- https://github.com/svbjdbk123/-
- https://github.com/twensoo/PersistentThreat
- https://github.com/wangsheng123168/123
- https://github.com/xairy/vmware-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xiaoZ-hc/redtool
- https://github.com/yut0u/RedTeam-BlackBox