SB2021042326 - Multiple vulnerabilities in Parallels Desktop



SB2021042326 - Multiple vulnerabilities in Parallels Desktop

Published: April 23, 2021

Security Bulletin ID SB2021042326
Severity
Low
Patch available
YES
Number of vulnerabilities 13
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 13 secuirty vulnerabilities.


1) Path traversal (CVE-ID: CVE-2021-31421)

The vulnerability allows a local user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences within the Toolgate component. A local administrator can send a specially crafted HTTP request and delete arbitrary files on the system.


2) Out-of-bounds read (CVE-ID: CVE-2021-31432)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the IDE virtual device. A local administrator can trigger out-of-bounds read error and read contents of memory on the system.


3) Out-of-bounds read (CVE-ID: CVE-2021-31431)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the IDE virtual device. A local administrator can trigger out-of-bounds read error and read contents of memory on the system.


4) Out-of-bounds read (CVE-ID: CVE-2021-31430)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the IDE virtual device. A local administrator can trigger out-of-bounds read error and read contents of memory on the system.


5) Heap-based buffer overflow (CVE-ID: CVE-2021-31429)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the IDE virtual device. A local administrator can pass specially crafted data to the application, trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


6) Heap-based buffer overflow (CVE-ID: CVE-2021-31428)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the IDE virtual device. A local administrator can pass specially crafted data to the application, trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2021-31427)

The vulnerability allows a local user to gain access to sensitive information on the system.

The vulnerability exists due to the lack of proper locking when performing operations on an object within the Open Tools Gate component. A local administrator can gain access to sensitive information on the target system.


8) Heap-based buffer overflow (CVE-ID: CVE-2021-31424)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the Open Tools Gate component. A local user can pass specially crafted data to the application, trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


9) Integer overflow (CVE-ID: CVE-2021-31426)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow within the Parallels Tools component. A local user can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


10) Integer overflow (CVE-ID: CVE-2021-31425)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow within the Parallels Tools component. A local user can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


11) Out-of-bounds read (CVE-ID: CVE-2021-31423)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the Toolgate component. A local administrator can trigger out-of-bounds read error and read contents of memory on the system.


12) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2021-31422)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to the lack of proper locking when performing operations on an object within the e1000e virtual device. A local administrator can escalate privileges and execute arbitrary code on the system.


13) Stack-based buffer overflow (CVE-ID: CVE-2021-31420)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the Toolgate component. A local user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.