This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Vmware First view 2017-06-07
Product Workstation Player Last view 2022-02-16
Version 12.5.2 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:vmware:workstation_player

Activity : Overall

Related : CVE

  Date Alert Description
6.7 2022-02-16 CVE-2021-22040

VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

7.7 2020-10-20 CVE-2020-3982

VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202008101-SG, 6.5 before ESXi650-202007101-SG), Workstation (15.x), Fusion (11.x before 11.5.6) contain an out-of-bounds write vulnerability due to a time-of-check time-of-use issue in ACPI device. A malicious actor with administrative access to a virtual machine may be able to exploit this vulnerability to crash the virtual machine's vmx process or corrupt hypervisor's memory heap.

6.5 2020-09-16 CVE-2020-3990

VMware Workstation (15.x) and Horizon Client for Windows (5.x before 5.4.4) contain an information disclosure vulnerability due to an integer overflow issue in Cortado ThinPrint component. A malicious actor with normal access to a virtual machine may be able to exploit this issue to leak memory from TPView process running on the system where Workstation or Horizon Client for Windows is installed. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon Client.

3.3 2020-09-16 CVE-2020-3989

VMware Workstation (15.x) and Horizon Client for Windows (5.x before 5.4.4) contain a denial of service vulnerability due to an out-of-bounds write issue in Cortado ThinPrint component. A malicious actor with normal access to a virtual machine may be able to exploit this issue to create a partial denial-of-service condition on the system where Workstation or Horizon Client for Windows is installed. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon Client.

6.1 2020-09-16 CVE-2020-3988

VMware Workstation (15.x) and Horizon Client for Windows (5.x before 5.4.4) contain an out-of-bounds read vulnerability in Cortado ThinPrint component (JPEG2000 parser). A malicious actor with normal access to a virtual machine may be able to exploit these issues to create a partial denial-of-service condition or to leak memory from TPView process running on the system where Workstation or Horizon Client for Windows is installed.

6.1 2020-09-16 CVE-2020-3987

VMware Workstation (15.x) and Horizon Client for Windows (5.x before 5.4.4) contain an out-of-bounds read vulnerability in Cortado ThinPrint component (EMR STRETCHDIBITS parser). A malicious actor with normal access to a virtual machine may be able to exploit these issues to create a partial denial-of-service condition or to leak memory from TPView process running on the system where Workstation or Horizon Client for Windows is installed.

6.1 2020-09-16 CVE-2020-3986

VMware Workstation (15.x) and Horizon Client for Windows (5.x before 5.4.4) contain an out-of-bounds read vulnerability in Cortado ThinPrint component (EMF Parser). A malicious actor with normal access to a virtual machine may be able to exploit these issues to create a partial denial-of-service condition or to leak memory from TPView process running on the system where Workstation or Horizon Client for Windows is installed.

5.3 2018-03-15 CVE-2018-6957

VMware Workstation (14.x before 14.1.1, 12.x) and Fusion (10.x before 10.1.1 and 8.x) contain a denial-of-service vulnerability which can be triggered by opening a large number of VNC sessions. Note: In order for exploitation to be possible on Workstation and Fusion, VNC must be manually enabled.

8.8 2017-06-07 CVE-2017-4903

VMware ESXi 6.5 without patch ESXi650-201703410-SG, 6.0 U3 without patch ESXi600-201703401-SG, 6.0 U2 without patch ESXi600-201703403-SG, 6.0 U1 without patch ESXi600-201703402-SG, and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have an uninitialized stack memory usage in SVGA. This issue may allow a guest to execute code on the host.

8.8 2017-06-07 CVE-2017-4902

VMware ESXi 6.5 without patch ESXi650-201703410-SG and 5.5 without patch ESXi550-201703401-SG; Workstation Pro / Player 12.x prior to 12.5.5; and Fusion Pro / Fusion 8.x prior to 8.5.6 have a Heap Buffer Overflow in SVGA. This issue may allow a guest to execute code on the host.

5.5 2017-06-07 CVE-2017-4900

VMware Workstation Pro/Player 12.x before 12.5.3 contains a NULL pointer dereference vulnerability that exists in the SVGA driver. Successful exploitation of this issue may allow attackers with normal user privileges to crash their VMs.

8.8 2017-06-07 CVE-2017-4898

VMware Workstation Pro/Player 12.x before 12.5.3 contains a DLL loading vulnerability that occurs due to the "vmware-vmx" process loading DLLs from a path defined in the local environment-variable. Successful exploitation of this issue may allow normal users to escalate privileges to System in the host machine where VMware Workstation is installed.

CWE : Common Weakness Enumeration

%idName
30% (4) CWE-125 Out-of-bounds Read
15% (2) CWE-787 Out-of-bounds Write
15% (2) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
7% (1) CWE-772 Missing Release of Resource after Effective Lifetime
7% (1) CWE-476 NULL Pointer Dereference
7% (1) CWE-416 Use After Free
7% (1) CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
7% (1) CWE-190 Integer Overflow or Wraparound

Nessus® Vulnerability Scanner

id Description
2018-11-16 Name: A virtualisation application installed on the remote macOS or Mac OS X host i...
File: macosx_fusion_vmsa_2018_0008.nasl - Type: ACT_GATHER_INFO
2017-03-31 Name: The remote VMware ESXi 6.0 host is affected by multiple vulnerabilities.
File: vmware_esxi_6_0_build_5251621_remote.nasl - Type: ACT_GATHER_INFO
2017-03-31 Name: The remote VMware ESXi 6.5 host is affected by multiple vulnerabilities.
File: vmware_esxi_6_5_build_5224529_remote.nasl - Type: ACT_GATHER_INFO
2017-03-30 Name: A virtualization application installed on the remote macOS or Mac OS X host i...
File: macosx_fusion_vmsa_2017_0006.nasl - Type: ACT_GATHER_INFO
2017-03-30 Name: The remote VMware ESXi host is missing one or more security-related patches.
File: vmware_VMSA-2017-0006.nasl - Type: ACT_GATHER_INFO
2017-03-30 Name: A virtualization application installed on the remote Linux host is affected b...
File: vmware_workstation_linux_vmsa_2017_0006.nasl - Type: ACT_GATHER_INFO
2017-03-30 Name: A virtualization application installed on the remote Windows host is affected...
File: vmware_workstation_win_vmsa_2017_0006.nasl - Type: ACT_GATHER_INFO
2017-03-20 Name: A virtualization application installed on the remote host is affected by mult...
File: vmware_workstation_multiple_vmsa_2017_0003.nasl - Type: ACT_GATHER_INFO