Η VMware released yesterday one new update security to correct two critical vulnerabilities that allow privilege escalation (escalation of benefits) and denial-of-service (DoS) attacks in VMware Workstation, VMware Fusion, VMware Remote Console and Horizon Client.
The vulnerabilities could lead to privilege escalation and DoS attacks
Vulnerability CVE-2020-3950 reported by Jeffball and Rich Mirch. VMware itself stated that the vulnerability is very serious.
This vulnerability affects it VMware Fusion (versions 11.x before 11.5.2), VMware Remote Console for Mac (all versions before 11.0.1) and Horizon Client for Poppy (all versions before 5.4.0).
On the other hand, the vulnerability that allows denial of service attacks, located at Cortado Thinprint and reported by Dhanesh Kizhakkinan of FireEye. This vulnerability affects them VMware Workstation (versions 15.x before 15.5.2), Windows and Linux apps, as well as the Horizon Client for Windows (all versions before 5.4).
VMware says the attackers could create a denial of service status on the service Thinprint, which runs on the system where the Workstation or Horizon Client is installed.
Critical Guest-to-Host DoS error was fixed last week
Last week, VMware fixed another critical one use-after-free vmnetdhcp vulnerability on VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2). The vulnerability could allow code execution on the host system and DoS attack.