The issue results from the lack of proper locking when performing operations on an object. The specific flaw exists within the update machanism. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop Parallels Desktop 17.1.1. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. By creating a symbolic link, an attacker can abuse the service to execute a file. The specific flaw exists within the Parallels service. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Access 6.5.4 (39316) Agent. The confidentiality, availability and integrity of the information of the user could be compromised if an attacker is able to recover the profile password. Parallels Remote Application Server (RAS) allows a local attacker to retrieve certain profile password in clear text format by uploading a previously stored cyphered file by Parallels RAS. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the hypervisor. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. The specific flaw exists within the Toolgate component. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.0.1-48919. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. The specific flaw exists within the virtio-gpu virtual device. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.3 (49160). The issue results from the lack of proper access control. The specific flaw exists within the WinAppHelper component. This vulnerability allows attackers to execute arbitrary commands via a crafted payload injected into the Host header. The Web Client of Parallels Remote Application Server v18.0 is vulnerable to Host Header Injection attacks. In addition, it was discovered that it is possible to access any host in the internal domain, even if it has no published applications or the mentioned host is no longer associated with that server farm. It allows an authenticated user to execute any application in the backend operating system through the web application, despite the affected application not being published. Parallels Remote Application Server (RAS) 17.1.1 has a Business Logic Error causing remote code execution.
0 Comments
Leave a Reply. |