CVE-2020-8872 – Parallels Desktop xHCI Out-Of-Bounds Read Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2020-8872
This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.1-47117. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the xHCI component. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the hypervisor. • https://www.zerodayinitiative.com/advisories/ZDI-20-293 • CWE-125: Out-of-bounds Read •
CVE-2020-8875 – Parallels Desktop OS X Host Kernel Module Out-Of-Bounds Write Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2020-8875
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.2-47123. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the IOCTL handler. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. • https://www.zerodayinitiative.com/advisories/ZDI-20-296 • CWE-129: Improper Validation of Array Index CWE-787: Out-of-bounds Write •
CVE-2020-8876 – Parallels Desktop OS X Host Kernel Module Out-Of-Bounds Read Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2020-8876
This vulnerability allows local attackers to disclose information on affected installations of Parallels Desktop 15.1.2-47123. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the IOCTL handler. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. • https://www.zerodayinitiative.com/advisories/ZDI-20-297 • CWE-125: Out-of-bounds Read CWE-129: Improper Validation of Array Index •
CVE-2020-7213
https://notcve.org/view.php?id=CVE-2020-7213
Parallels 13 uses cleartext HTTP as part of the update process, allowing man-in-the-middle attacks. Users of out-of-date versions are presented with a pop-up window for a parallels_updates.xml file on the http://update.parallels.com web site. Parallels versión 13 utiliza HTTP en texto sin cifrar como parte del proceso de actualización, permitiendo ataques de tipo man-in-the-middle. A usuarios de versiones desactualizadas se les presenta con una ventana emergente para un archivo parallels_updates.xml en el sitio web http://update.parallels.com. • http://almorabea.net/cves/cve-2020-7213.txt http://almorabea.net/en/2020/01/19/write-up-for-the-parallel-vulnerability-cve-2020-7213 https://parallels.com • CWE-312: Cleartext Storage of Sensitive Information •
CVE-2019-17148 – Parallels Desktop Command Injection Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2019-17148
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop Parallels Desktop version 14.1.3 (45485). An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Parallels Service. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of root. • https://www.zerodayinitiative.com/advisories/ZDI-19-1028 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •