Moderate

VMSA-2020-0024
3.3 - 4.1
2020-10-22
2020-10-22 (Initial Advisory)
CVE-2020-3997, CVE-2020-3998
VMware Horizon Server and VMware Horizon Client updates address multiple security vulnerabilities (CVE-2020-3997, CVE-2020-3998)

Share this page on social media

Sign up for Security Advisories

1. Impacted Products
  • VMware Horizon Server
  • VMware Horizon Client for Windows
2. Introduction

Multiple vulnerabilities in VMware Horizon Server and Horizon Client for Windows were privately reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products.

3a. VMware Horizon Server Cross Site Scripting (XSS) vulnerability (CVE-2020-3997)

Description

VMware Horizon Server does not correctly validate user input. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.1.

Known Attack Vectors

Successful exploitation of this issue may allow an attacker to inject malicious script which will be executed.

Resolution

To remediate CVE-2020-3997 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' below.

Workarounds

None.

Additional Documentation

None.

Notes

None.

Acknowledgements

VMware would like to thank mobius07 for reporting this issue to us.

Response Matrix

Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation
Horizon Server
7.x
Any
CVE-2020-3997
moderate
7.10.3 or 7.13.0
None
None
Horizon Server
8.x
N/A
N/A
N/A
N/A
Unaffected
N/A
N/A
3b. VMware Horizon Client for Windows information disclosure vulnerability (CVE-2020-3998)

Description

VMware Horizon Server does not correctly validate user input. VMware has evaluated the severity of this issue to be in the Low severity range with a maximum CVSSv3 base score of 3.3.

Known Attack Vectors

A malicious attacker with local privileges on the machine where Horizon Client for Windows is installed may be able to retrieve hashed credentials if the client crashes.

Resolution

To remediate CVE-2020-3998 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' below.

Workarounds

None.

Additional Documentation

None.

Notes

None.

Acknowledgements

VMware would like to thank Yann Souchon and Quentin for reporting this issue to us.

Response Matrix

Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation
Horizon Client for Windows
5.x and prior
Windows
CVE-2020-3998
low
5.5.0
None
None
4. References
5. Change Log

2020-10-22 VMSA-2020-0024
Initial security advisory.

6. Contact

E-mail list for product security notifications and announcements:

https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce 

 

This Security Advisory is posted to the following lists:  

security-announce@lists.vmware.com  

bugtraq@securityfocus.com  

fulldisclosure@seclists.org 

 

E-mail: security@vmware.com

PGP key at:

https://kb.vmware.com/kb/1055 

 

VMware Security Advisories

https://www.vmware.com/security/advisories 

 

VMware Security Response Policy

https://www.vmware.com/support/policies/security_response.html 

 

VMware Lifecycle Support Phases

https://www.vmware.com/support/policies/lifecycle.html 

 

VMware Security & Compliance Blog  

https://blogs.vmware.com/security 

 

Twitter

https://twitter.com/VMwareSRC

 

Copyright 2020 VMware Inc. All rights reserved.