First published: Wed Sep 16 2020(Updated: )
VMware Workstation (15.x) and Horizon Client for Windows (5.x before 5.4.4) contain an out-of-bounds read vulnerability in Cortado ThinPrint component (EMR STRETCHDIBITS parser). A malicious actor with normal access to a virtual machine may be able to exploit these issues to create a partial denial-of-service condition or to leak memory from TPView process running on the system where Workstation or Horizon Client for Windows is installed.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vmware Horizon Client | >=5.0.0<5.4.4 | |
VMware Workstation Player | >=15.0.0<16.0.0 | |
VMware Workstation Pro | >=15.0.0<16.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this VMware Workstation and Horizon Client vulnerability is CVE-2020-3987.
The severity of CVE-2020-3987 is medium with a CVSS score of 6.1.
VMware Horizon Client versions from 5.0.0 to 5.4.4, VMware Workstation Player versions from 15.0.0 to 16.0.0, and VMware Workstation Pro versions from 15.0.0 to 16.0.0 are affected by CVE-2020-3987.
CVE-2020-3987 is an out-of-bounds read vulnerability in the Cortado ThinPrint component (EMR STRETCHDIBITS parser) of VMware Workstation and Horizon Client for Windows, which could allow a malicious actor with normal access to a virtual machine to create a partial denial-of-service condition.
Yes, VMware has released a fix for CVE-2020-3987. It is recommended to update to VMware Workstation version 15.5.7, VMware Horizon Client version 5.4.4, VMware Workstation Player version 15.5.7, or VMware Workstation Pro version 15.5.7 to mitigate the vulnerability.