Kaspersky ID:
KLA12098
Дата обнаружения:
23/06/2020
Обновлено:
25/01/2024

Описание

Multiple vulnerabilities were found in VMware Workstation and Player. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, cause denial of service.

Below is a complete list of vulnerabilities:

  1. A out-of-bound read vulnerability in Shader Functionality can be exploited locally to cause denial of service.
  2. A information leak vulnerability in the EHCI USB controller can be exploited locally to obtain sensitive information.
  3. A heap overflow vulnerability in EHCI controller can be exploited locally to execute arbitrary code.
  4. A use after free vulnerability in SVGA device can be exploited locally to execute arbitrary code.
  5. A information leak vulnerability in the XHCI USB controller can be exploited locally to obtain sensitive information.
  6. A out of bounds write vulnerability in xHCI controller can be exploited locally to cause denial of service or execute arbitrary code.
  7. A heap overflow vulnerability in vmxnet3 can be exploited locally to obtain sensitive information.
  8. A heap overflow vulnerability in SVGA device can be exploited locally to execute arbitrary code.
  9. A use after free vulnerability in PVNVRAM can be exploited to obtain sensitive infromation.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2020-3970
    warning
  • CVE-2020-3964
    warning
  • CVE-2020-3966
    critical
  • CVE-2020-3962
    critical
  • CVE-2020-3965
    high
  • CVE-2020-3968
    critical
  • CVE-2020-3971
    high
  • CVE-2020-3967
    critical
  • CVE-2020-3969
    critical
  • CVE-2020-3963
    high

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.