CVE-2018-6981

high

Description

VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may allow a guest to execute code on the host.

From the Tenable Blog

VMware Issues Security Advisory for Guest-to-Host Escape Vulnerability (CVE-2018-6981)
VMware Issues Security Advisory for Guest-to-Host Escape Vulnerability (CVE-2018-6981)

Published: 2018-11-12

VMware issued an advisory about two uninitialized stack memory usage bugs and has released patches and updates for some versions of the affected software. Background On November 9, VMware published a security advisory to address a Guest-to-Host Escape vulnerability affecting VMware ESXi, Workstation and Fusion. The vulnerability was discovered and released by a security researcher at GeekPwn 2018, an annual security conference in Shanghai, China which took place in late October 2018. The researcher reported the vulnerability to VMware through GeekPwn.

References

https://www.tenable.com/blog/vmware-issues-security-advisory-for-guest-to-host-escape-vulnerability-cve-2018-6981

https://www.vmware.com/security/advisories/VMSA-2018-0027.html

http://www.securitytracker.com/id/1042055

http://www.securitytracker.com/id/1042054

http://www.securityfocus.com/bid/105881

Details

Source: Mitre, NVD

Published: 2018-12-04

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Severity: High