Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-6981 PoC — Vmware ESXi、Workstation和Fusion 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Vmware ESXi、Workstation和Fusion 缓冲区错误漏洞 (CVE-2018-6981)
Description:VMware ESXi 6.7 without ESXi670-201811401-BG and VMware ESXi 6.5 without ESXi650-201811301-BG, VMware ESXi 6.0 without ESXi600-201811401-BG, VMware Workstation 15, VMware Workstation 14.1.3 or below, VMware Fusion 11, VMware Fusion 10.1.3 or below contain uninitialized stack memory usage in the vmxnet3 virtual network adapter which may allow a guest to execute code on the host.
Description
Use this tool to prioritize cluster patching for the recent VMware advisory VMSA-2018-0027 related to CVE-2018-6981 and CVE-2018-6982.
Readme
Summary:  
vmxnet3Hunter will find all virtual machines running the vmxnet3 adapter and flag the parent cluster as vulenrable to the recent vmEscape advisory.  

VMware Advisory: https://www.vmware.com/security/advisories/VMSA-2018-0027.html  
CVE: CVE-2018-6981, CVE-2018-6982  



File Snapshot

[4.0K] /data/pocs/3d9ba507e12d44241dfa310b895a131e858f3cce ├── [ 283] README.md └── [6.4K] vmxnet3Hunter.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →