Jump to content

VMware Releases Security Updates , An attacker could exploit one of these vulnerabilities


Disco Bob

Recommended Posts

VMware has released a security advisory to address vulnerabilities affecting multiple products. An attacker could exploit one of these vulnerabilities to take control of an affected system.

 

1. Impacted Products
  • VMware vSphere ESXi (ESXi)
  • VMware Workstation Pro / Player (Workstation)
  • VMware Fusion Pro / Fusion (Fusion)
2. Introduction
VMware ESXi, Workstation and Fusion updates address the following pixel shader vulnerabilities:
  • CVE-2019-5521 - Out-of-bounds read vulnerability - CVSSv3 = 6.3-7.7
  • CVE-2019-5684 - Out-of-bounds write vulnerability - CVSSv3 = 8.5
3. VMware ESXi, Workstation and Fusion pixel shader out-of-bounds read/write vulnerabilities (CVE-2019-5521, CVE-2019-5684)

Description:

VMware ESXi, Workstation and Fusion contain out-of-bounds read/write vulnerabilities in the pixel shader functionality. VMware has evaluated the severity of these issues to be in the Important severity range with a maximum CVSSv3 base score of 8.5.

 

Known Attack Vectors:

Exploitation of these issues require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.

 

Successful exploitation of the out-of-bounds read issue (CVE-2019-5521) may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on the host.

 

The out-of-bounds write issue (CVE-2019-5684) can be exploited only if the host has an affected NVIDIA graphics driver. Successful exploitation of this issue may lead to code execution on the host. Customers should check NVIDIA security advisory for additional information. 

 

Resolution:

  • To remediate these vulnerabilities, apply the patches listed in the 'Fixed Version' column of the 'Resolution Matrix' found below.
  • Alternatively, CVE-2019-5684 can be remediated by installing the updated NVIDIA graphics driver.

 

Workarounds:

The workaround for these issues involves disabling the 3D-acceleration feature. Please see the 'Workarounds'  column of the 'Resolution Matrix' found below.

 

Additional Documentations:

None.

 

Acknowledgements:

VMware would like to thank Piotr Bania of Cisco Talos for reporting these issues to us.

 

* CVE-2019-5684 is relevant if an affected NVIDIA graphics driver is present.

4. References

Mitre CVE Dictionary Links:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5684

 

NIVDIA security advisory link:
https://nvidia.custhelp.com/app/answers/detail/a_id/4841

 

Fixed Version(s) and Release Notes:

 

ESXi 6.7

Downloads and Documentation:
https://my.vmware.com/web/vmware/info/slug/datacenter_cloud_infrastructure/vmware_vsphere/6_7
https://docs.vmware.com/en/VMware-vSphere/6.7/rn/vsphere-esxi-67u2-release-notes.html

 

ESXi 6.5
Downloads and Documentation:
https://my.vmware.com/web/vmware/info/slug/datacenter_cloud_infrastructure/vmware_vsphere/6_5
https://docs.vmware.com/en/VMware-vSphere/6.5/rn/esxi650-201903001.html

 

VMware Workstation Pro 14.1.6, 15.0.3

Downloads and Documentation:
https://www.vmware.com/go/downloadworkstation
https://docs.vmware.com/en/VMware-Workstation-Pro/index.html

 

VMware Workstation Player 14.1.6, 15.0.3

Downloads and Documentation:
https://www.vmware.com/go/downloadplayer
https://docs.vmware.com/en/VMware-Workstation-Player/index.html

 

VMware Fusion Pro / Fusion 10.1.6, 11.0.3

Downloads and Documentation:
https://www.vmware.com/go/downloadfusion
https://docs.vmware.com/en/VMware-Fusion/index.html

 

5. Change log
 

2019-08-02: VMSA-2019-0012 - Initial security advisory.

 

https://www.vmware.com/security/advisories/VMSA-2019-0012.html

Link to comment
Share on other sites


  • Views 555
  • Created
  • Last Reply

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...