Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mr2m-75hp-m2f7

Опубликовано: 20 июн. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 8.2

Описание

Parallels Desktop Toolgate Heap-based Buffer Overflow Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability.

The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the current user on the host system. Was ZDI-CAN-20450.

Parallels Desktop Toolgate Heap-based Buffer Overflow Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability.

The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the current user on the host system. Was ZDI-CAN-20450.

EPSS

Процентиль: 16%
0.00051
Низкий

8.2 High

CVSS3

Дефекты

CWE-122
CWE-787

Связанные уязвимости

CVSS3: 6.7
nvd
больше 1 года назад

Parallels Desktop Toolgate Heap-based Buffer Overflow Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the current user on the host system. Was ZDI-CAN-20450.

CVSS3: 8.2
fstec
почти 3 года назад

Уязвимость компонента Toolgate гипервизора Parallels Desktop, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

EPSS

Процентиль: 16%
0.00051
Низкий

8.2 High

CVSS3

Дефекты

CWE-122
CWE-787