CVE-2017-4913
Published Jun 8, 2017
Last updated 7 years ago
Overview
- Description
- VMware Workstation (12.x prior to 12.5.3) and Horizon View Client (4.x prior to 4.4.0) contain an integer-overflow vulnerability in the True Type Font parser in the TPView.dll. On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon View Client. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View.
- Source
- security@vmware.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6
- Exploitability score
- 1.1
- Vector string
- CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.9
- Impact score
- 10
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-190
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:horizon_view:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF333D9B-18E5-4753-B6FA-5AE9001F6C30" }, { "criteria": "cpe:2.3:a:vmware:horizon_view:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC91776C-7B4E-4242-B8F8-EAC4D18C2748" }, { "criteria": "cpe:2.3:a:vmware:horizon_view:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "003D6C48-2873-4070-A433-109AD21036E3" }, { "criteria": "cpe:2.3:a:vmware:horizon_view:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF2E2C09-1BFD-46D5-A56A-987D6739BCF7" }, { "criteria": "cpe:2.3:a:vmware:workstation:12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1659EFD4-97A7-4DBC-91DA-0B9EE18874F4" }, { "criteria": "cpe:2.3:a:vmware:workstation:12.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D38FB28D-8A42-4877-92AF-39EE04B14DB1" }, { "criteria": "cpe:2.3:a:vmware:workstation:12.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "180E48AF-AD42-4A00-948A-9C1D70BE53F9" }, { "criteria": "cpe:2.3:a:vmware:workstation:12.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66C64A90-90A2-450A-8A79-AB69B5A939DC" }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE6B9B4F-53C5-4B47-89C4-AD221DC91D44" }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E293B67-98C3-4D8E-883C-2F2F774AE6F0" }, { "criteria": "cpe:2.3:a:vmware:workstation:12.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB307F39-3A90-4B62-B2BF-0E0CEBBBBC9F" } ], "operator": "OR" } ] } ]