GitHub is now a VMware virtual machine escape exp, leveraging March exposure to cve-2017-4901 vulnerabilities

Source: Internet
Author: User
Tags windows x64 vmware fusion cve

After this year's Pwn2Own competition, VMware recently released updates for its ESXi, wordstation, and fusion products to fix some of the high-risk vulnerabilities uncovered in the hacker contest. In fact, before the tournament began, VMware urgently repaired a virtual machine escape vulnerability numbered cve-2017-4901.

And recently, someone on GitHub unveiled a VMware Virtual machine escape utility, which is the cve-2017-4901, which is capable of attacking 12.5. VMware WorkStation before version 5, the target host is Windows x64. The compiler used by the exploit tool is visual Studio 2013. The VMware version tested by the author is the VMware 12.5.2 build-4638234.

This tool exploits a escaping vulnerability in the Pwn2Own contest, numbered cve-2017-4901. March 14 this year, the official VMware has been updated.

Although the uploader did not release the identity, the map can be inferred that the uploader may have come from China. Interested students can click here to test. If you're having problems restarting VMware after running a test program inside a virtual machine, remember to delete the. lck folder under the VM directory or use the script here to complete the operation. The following is a brief description of the vulnerability:

Vulnerability number



Impact Range

VMware Workstation Pro/player (prior to 12.5.5 version)

VMware Fusion pro/fusion

Vulnerability Rating

Critical (Critical)

Vulnerability Details

Drag-and-drop (DnD) features in VMware Workstation and fusion contain out-of-bounds memory access vulnerabilities. This allows the guest to execute code on the operating system running workstation or fusion.

Remediation Scenarios

Update to new version

From the diagram on GitHub, the attacker could successfully open the calculator in the host after launching the program in VMware, causing the virtual machine to escape.

GitHub is now a VMware virtual machine escape exp, leveraging March exposure to cve-2017-4901 vulnerabilities

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.