VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds write vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this vulnerability to crash the virtual machine's vmx process or corrupt hypervisor's memory heap.
References
Link | Resource |
---|---|
https://www.vmware.com/security/advisories/VMSA-2020-0023.html | Patch Vendor Advisory |
https://www.vmware.com/security/advisories/VMSA-2020-0023.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 05:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.vmware.com/security/advisories/VMSA-2020-0023.html - Patch, Vendor Advisory |
Information
Published : 2020-10-20 17:15
Updated : 2024-11-21 05:32
NVD link : CVE-2020-3982
Mitre link : CVE-2020-3982
CVE.ORG link : CVE-2020-3982
JSON object : View
Products Affected
apple
- mac_os_x
vmware
- cloud_foundation
- esxi
- workstation_player
- fusion
- workstation