VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds write vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this vulnerability to crash the virtual machine's vmx process or corrupt hypervisor's memory heap.
References
Link | Resource |
---|---|
https://www.vmware.com/security/advisories/VMSA-2020-0023.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
Information
Published : 2020-10-20 10:15
Updated : 2020-10-30 09:53
NVD link : CVE-2020-3982
Mitre link : CVE-2020-3982
JSON object : View
Products Affected
vmware
- cloud_foundation
- workstation
- fusion
- workstation_player
- esxi
apple
- mac_os_x