VMware Security Advisories

Advisory ID VMSA-2019-0012
Advisory Severity Important
CVSSv3 Range 6.3-8.5
Synopsis VMware ESXi, Workstation and Fusion updates address out-of-bounds read/write vulnerabilities (CVE-2019-5521, CVE-2019-5684)
Issue Date 2019-08-02
Updated On 2019-08-02 (Initial Advisory)
CVE(s) CVE-2019-5521, CVE-2019-5684
1. Impacted Products
  • VMware vSphere ESXi (ESXi)
  • VMware Workstation Pro / Player (Workstation)
  • VMware Fusion Pro / Fusion (Fusion)
2. Introduction
VMware ESXi, Workstation and Fusion updates address the following pixel shader vulnerabilities:
  • CVE-2019-5521 - Out-of-bounds read vulnerability - CVSSv3 = 6.3-7.7
  • CVE-2019-5684 - Out-of-bounds write vulnerability - CVSSv3 = 8.5
3. VMware ESXi, Workstation and Fusion pixel shader out-of-bounds read/write vulnerabilities (CVE-2019-5521, CVE-2019-5684)

Description:

VMware ESXi, Workstation and Fusion contain out-of-bounds read/write vulnerabilities in the pixel shader functionality. VMware has evaluated the severity of these issues to be in the Important severity range with a maximum CVSSv3 base score of 8.5.

 

Known Attack Vectors:

Exploitation of these issues require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.

 

Successful exploitation of the out-of-bounds read issue (CVE-2019-5521) may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on the host.

 

The out-of-bounds write issue (CVE-2019-5684) can be exploited only if the host has an affected NVIDIA graphics driver. Successful exploitation of this issue may lead to code execution on the host. Customers should check NVIDIA security advisory for additional information. 

 

Resolution:

  • To remediate these vulnerabilities, apply the patches listed in the 'Fixed Version' column of the 'Resolution Matrix' found below.
  • Alternatively, CVE-2019-5684 can be remediated by installing the updated NVIDIA graphics driver.

 

Workarounds:

The workaround for these issues involves disabling the 3D-acceleration feature. Please see the 'Workarounds'  column of the 'Resolution Matrix' found below.

 

Additional Documentations:

None.

 

Acknowledgements:

VMware would like to thank Piotr Bania of Cisco Talos for reporting these issues to us.

 

Response Matrix:

Product Version Running On CVE Identifier* CVSSV3 Severity Fixed Version Workarounds Additional Documents
ESXi
6.7
Any
CVE-2019-5521/
CVE-2019-5684
6.3/
8.5
Important
ESXi670-201904101-SG
see VMSA-2018-0025
None
ESXi 6.5 Any CVE-2019-5521/
CVE-2019-5684
6.3/
8.5
Important ESXi650-201903001 see VMSA-2018-0025 None
ESXi 6.0 Any CVE-2019-5521/
CVE-2019-5684
N/A N/A Not affected N/A N/A
Workstation 15.x Any CVE-2019-5521/
CVE-2019-5684
7.7/
8.5
Important 15.0.3 see VMSA-2018-0025 None
Workstation 14.x Any CVE-2019-5521/
CVE-2019-5684
7.7/
8.5
Important 14.1.6 see VMSA-2018-0025 None
Fusion 11.x OSX CVE-2019-5521/
CVE-2019-5684
7.7/
8.5
Important 11.0.3 see VMSA-2018-0025 None
Fusion 10.x OSX CVE-2019-5521/
CVE-2019-5684
7.7/
8.5
Important 10.1.6 see VMSA-2018-0025 None

* CVE-2019-5684 is relevant if an affected NVIDIA graphics driver is present.

5. Change log
 

2019-08-02: VMSA-2019-0012 - Initial security advisory.

 

6. Contact

 

E-mail list for product security notifications and announcements:

https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

 

This Security Advisory is posted to the following lists:

  security-announce@lists.vmware.com

  bugtraq@securityfocus.com

  fulldisclosure@seclists.org

 

E-mail: security@vmware.com

PGP key at:

https://kb.vmware.com/kb/1055

 

VMware Security Advisories

https://www.vmware.com/security/advisories

 

VMware Security Response Policy

https://www.vmware.com/support/policies/security_response.html

 

VMware Lifecycle Support Phases

https://www.vmware.com/support/policies/lifecycle.html

 

VMware Security & Compliance Blog  

https://blogs.vmware.com/security

 

Twitter

https://twitter.com/VMwareSRC

 

Copyright 2019 VMware Inc. All rights reserved.