This vulnerability allows local attackers to disclose sensitive information on affected installations of VMware Workstation. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the parsing of shader bytecode. By manipulating a document's elements, an attacker can trigger a read past the end of an allocated array. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the hypervisor.
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-782 is considered high due to the potential for local attackers to disclose sensitive information.
To fix ZDI-20-782, you should apply the latest patches provided by VMware for Workstation.
ZDI-20-782 affects installations of VMware Workstation that have not been updated with the latest security patches.
Local attackers with the ability to execute low-privileged code on the target guest system can exploit ZDI-20-782.
ZDI-20-782 allows local attackers to potentially disclose sensitive information from the affected installations.