Search for vulnerabilities
| Vulnerability ID | VCID-aps4-nm33-kqft |
| Aliases |
CVE-2017-3575
|
| Summary | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H). |
| Status | Published |
| Exploitability | None |
| Weighted Severity | None |
| Risk | None |
| Affected and Fixed Packages | Package Details |
| There are no known CWE. |
| Reference id | Reference type | URL |
|---|---|---|
| https://api.first.org/data/v1/epss?cve=CVE-2017-3575 | ||
| https://www.exploit-db.com/exploits/41906/ | ||
| http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html | ||
| http://www.securityfocus.com/bid/97755 | ||
| http://www.securitytracker.com/id/1038288 | ||
| cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:* | https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:* | |
| CVE-2017-3575 | Exploit | https://bugs.chromium.org/p/project-zero/issues/detail?id=1136 |
| CVE-2017-3575 | Exploit | https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41906.txt |
| CVE-2017-3575 | https://nvd.nist.gov/vuln/detail/CVE-2017-3575 |
| Data source | Exploit-DB |
|---|---|
| Date added | April 20, 2017 |
| Description | Oracle VM VirtualBox - 'virtio-net' Guest-to-Host Out-of-Bounds Write |
| Ransomware campaign use | Known |
| Source publication date | April 20, 2017 |
| Exploit type | dos |
| Platform | multiple |
| Source update date | April 25, 2017 |
| Source URL | https://bugs.chromium.org/p/project-zero/issues/detail?id=1136 |
| Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Percentile | 0.66901 |
| EPSS Score | 0.00525 |
| Published At | April 1, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T17:51:42.865470+00:00 | EPSS Importer | Import | https://epss.cyentia.com/epss_scores-current.csv.gz | 38.0.0 |