Kaspersky ID:
KLA12098
Detect Date:
06/23/2020
Updated:
01/25/2024

Description

Multiple vulnerabilities were found in VMware Workstation and Player. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, cause denial of service.

Below is a complete list of vulnerabilities:

  1. A out-of-bound read vulnerability in Shader Functionality can be exploited locally to cause denial of service.
  2. A information leak vulnerability in the EHCI USB controller can be exploited locally to obtain sensitive information.
  3. A heap overflow vulnerability in EHCI controller can be exploited locally to execute arbitrary code.
  4. A use after free vulnerability in SVGA device can be exploited locally to execute arbitrary code.
  5. A information leak vulnerability in the XHCI USB controller can be exploited locally to obtain sensitive information.
  6. A out of bounds write vulnerability in xHCI controller can be exploited locally to cause denial of service or execute arbitrary code.
  7. A heap overflow vulnerability in vmxnet3 can be exploited locally to obtain sensitive information.
  8. A heap overflow vulnerability in SVGA device can be exploited locally to execute arbitrary code.
  9. A use after free vulnerability in PVNVRAM can be exploited to obtain sensitive infromation.

Original advisories

Related products

CVE list

  • CVE-2020-3970
    warning
  • CVE-2020-3964
    warning
  • CVE-2020-3966
    critical
  • CVE-2020-3962
    critical
  • CVE-2020-3965
    high
  • CVE-2020-3968
    critical
  • CVE-2020-3971
    high
  • CVE-2020-3967
    critical
  • CVE-2020-3969
    critical
  • CVE-2020-3963
    high

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.