CVE-2020-17402 – Parallels Desktop prl_hypervisor Incorrect Permission Assignment for Critical Resource Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2020-17402
This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.4 (47270). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the prl_hypervisor kext. By examining a log file, an attacker can disclose a memory address. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute code in the context of the kernel. • https://kb.parallels.com/en/125013 https://www.zerodayinitiative.com/advisories/ZDI-20-1020 • CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2020-15860
https://notcve.org/view.php?id=CVE-2020-15860
Parallels Remote Application Server (RAS) 17.1.1 has a Business Logic Error causing remote code execution. It allows an authenticated user to execute any application in the backend operating system through the web application, despite the affected application not being published. In addition, it was discovered that it is possible to access any host in the internal domain, even if it has no published applications or the mentioned host is no longer associated with that server farm. Parallels Remote Application Server (RAS) versión 17.1.1, presenta un Error de Lógica de Negocios que causa una ejecución de código remota. Permite a un usuario autenticado ejecutar cualquier aplicación en el sistema operativo backend por medio de la aplicación web, a pesar de que la aplicación afectada no ha sido publicada. • https://kb.parallels.com/en/125112 https://www.coresecurity.com/core-labs/advisories/parallels-ras-os-command-execution https://www.parallels.com/products/ras/remote-application-server •
CVE-2020-8873 – Parallels Desktop xHCI Time-Of-Check Time-Of-Use Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2020-8873
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.2-47123. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the xHCI component. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the hypervisor. • https://www.zerodayinitiative.com/advisories/ZDI-20-294 • CWE-269: Improper Privilege Management CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2020-8874 – Parallels Desktop xHCI Integer Overflow Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2020-8874
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.2-47123. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the xHCI component. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the hypervisor. • https://www.zerodayinitiative.com/advisories/ZDI-20-295 • CWE-190: Integer Overflow or Wraparound •
CVE-2020-8871 – Parallels Desktop VGA Out-Of-Bounds Write Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2020-8871
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.0-47107 . An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the VGA virtual device. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the hypervisor. • https://www.zerodayinitiative.com/advisories/ZDI-20-292 • CWE-787: Out-of-bounds Write •