CVE-2019-5517
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
15/04/2019
Last modified:
16/04/2019
Description
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) contain multiple out-of-bounds read vulnerabilities in the shader translator. Exploitation of these issues requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of these issues may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for these issues involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
Impact
Base Score 3.x
6.80
Severity 3.x
MEDIUM
Base Score 2.0
5.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:* | 10.0.0 (including) | 10.1.6 (excluding) |
| cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:* | 11.0.0 (including) | 11.0.3 (excluding) |
| cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* | 14.0.0 (including) | 14.1.6 (excluding) |
| cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* | 15.0.0 (including) | 15.0.3 (excluding) |
| cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:* | ||
| cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



