| Title | 複数の VMware 製品における情報漏えいに関する脆弱性 |
|---|---|
| Summary | VMware ESXi、Workstation、および Fusion には、情報漏えいに関する脆弱性が存在します。 |
| Possible impacts | 情報を取得される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | March 28, 2017, midnight |
| Registration Date | July 4, 2017, 4:50 p.m. |
| Last Update | July 4, 2017, 4:50 p.m. |
| CVSS3.0 : 警告 | |
| Score | 5.5 |
|---|---|
| Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
| CVSS2.0 : 注意 | |
| Score | 2.1 |
|---|---|
| Vector | AV:L/AC:L/Au:N/C:P/I:N/A:N |
| VMware |
| VMware ESXi パッチ ESXi550-201703401-SG 未適用の 5.5 |
| VMware ESXi パッチ ESXi600-201703401-SG 未適用の 6.0 U3 |
| VMware ESXi パッチ ESXi600-201703402-SG 未適用の 6.0 U1 |
| VMware ESXi パッチ ESXi600-201703403-SG 未適用の 6.0 U2 |
| VMware ESXi パッチ ESXi650-201703410-SG 未適用の 6.5 |
| VMware Fusion 8.5.6 未満の 8.x |
| VMware Fusion Pro 8.5.6 未満の 8.x |
| VMware Workstation Player 12.5.5 未満の 12.x |
| VMware Workstation Pro 12.5.5 未満の 12.x |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2017年07月04日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have uninitialized memory usage. This issue may lead to an information leak. |
|---|---|
| Publication Date | June 8, 2017, 3:29 a.m. |
| Registration Date | Jan. 26, 2021, 1:25 p.m. |
| Last Update | Nov. 21, 2024, 12:26 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:* | 8.0.0 | 8.5.6 | |||
| cpe:2.3:a:vmware:fusion_pro:*:*:*:*:*:*:*:* | 8.0.0 | 8.5.6 | |||
| execution environment | |||||
| 1 | cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:* | ||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:5.5:-:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:6.0:1:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:6.0:1a:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:6.0:1b:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:6.0:2:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:6.0:3:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:6.0:3a:*:*:*:*:*:* | |||||
| cpe:2.3:a:vmware:workstation_player:*:*:*:*:*:*:*:* | 12.0.0 | 12.5.5 | |||
| cpe:2.3:a:vmware:workstation_pro:*:*:*:*:*:*:*:* | 12.0.0 | 12.5.5 | |||
| cpe:2.3:o:vmware:esxi:5.5:1:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:5.5:2:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:5.5:3a:*:*:*:*:*:* | |||||
| cpe:2.3:o:vmware:esxi:5.5:3b:*:*:*:*:*:* | |||||