VMware Fusion 8.x < 8.5.5 Drag-and-Drop Feature Guest-to-Host Code Execution (VMSA-2017-0005) (macOS)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

A virtualization application installed on the remote macOS or Mac OS X
host is affected by a guest-to-host arbitrary code execution
vulnerability.

Description :

The version of VMware Fusion installed on the remote macOS or Mac OS X
host is 8.x prior to 8.5.5. It is, therefore, affected by a
guest-to-host arbitrary code execution vulnerability in the
drag-and-drop (DND) functionality due to an out-of-bounds memory
access error. An attacker within a guest can exploit this issue to
execute arbitrary code on the host system.

See also :

https://www.vmware.com/security/advisories/VMSA-2017-0005.html

Solution :

Upgrade to VMware Fusion version 8.5.5 or later. Alternatively,
disable both the drag-and-drop function and the copy-and-paste
function.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 5.6
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: MacOS X Local Security Checks

Nessus Plugin ID: 97939 ()

Bugtraq ID: 96881

CVE ID: CVE-2017-4901

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now