Page 14 of 70 results (0.009 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop Parallels Desktop version 14.1.3 (45485). An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Parallels Service. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of root. • https://www.zerodayinitiative.com/advisories/ZDI-19-1028 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Heap-based buffer overflow in the VGA device in Parallels allows local users, with root access to the guest operating system, to terminate the virtual machine and possibly execute arbitrary code in the host operating system via unspecified vectors related to bitblt operations. Desbordamiento de búfer basado en pila en el controlador VGA en Parallels permite a usuarios locales, con acceso de root para el sistema operativo invitado, para terminar la máquina virtual y posiblemente ejecutar código de su elección en el sistema operativo host a través de vectores no especificados relacionados con operaciones bitblt. • http://osvdb.org/40228 http://taviso.decsystem.org/virtsec.pdf •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Parallels allows local users to cause a denial of service (virtual machine abort) via (1) certain INT instructions, as demonstrated by INT 0xAA; (2) an IRET instruction when an invalid address is at the top of the stack; (3) a malformed MOVNTI instruction, as demonstrated by using a register as a destination; or a write operation to (4) SEGR6 or (5) SEGR7. Parallels permite a usuarios locales provocar una denegación de servicio (detención de máquina virtual) mediante (1) determinadas instruciones INT, como se ha demostrado con INT 0xAA; (2) una instrucción IRET cuando una dirección inválida está en la posición superior de la pila; (3) una instrucción MOVNTI mal formada, como se ha demostrado utilizando un registro como destino; o una operación de escritura a (4) SEGR6 o (5) SEGR7. • http://osvdb.org/41164 http://osvdb.org/41165 http://osvdb.org/41166 http://osvdb.org/41167 http://taviso.decsystem.org/virtsec.pdf •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Parallels Desktop for Mac before 20070216 implements Drag and Drop by sharing the entire host filesystem as the .psf share, which allows local users of the guest operating system to write arbitrary files to the host filesystem, and execute arbitrary code via launchd by writing a plist file to a LaunchAgents directory. Parallels Desktop para Mac anterior a 20070216 implementa Drag y Drop compartiendo el sistema de ficheros del host completamente como el compartido .hsf, lo caul permite a usuarios locales del sistemas operativo invitado escribir archivos de su elección a través del fichero de sistema host y ejecutar código de su elección a través de la creación con la escritura de un archivo plist en un directorio LaunchAgents. • http://lists.immunitysec.com/pipermail/dailydave/2007-February/004091.html http://osvdb.org/33799 http://secunia.com/advisories/24171 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

prl_dhcpd in Parallels Desktop for Mac Build 1940 uses insecure permissions (0666) for /Library/Parallels/.dhcpd_configuration, which allows local users to modify DHCP configuration. prl_dhcpd en Parallels Desktop para Mac Build 1940 utiliza permisos inseguros (0666) para /Library/Parallels/.dhcpd_configuration, lo que permite a usuarios locales modificar la configuración DHCP. • http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0582.html http://secunia.com/advisories/22634 •