VMware cleared pixel shader out-of-bounds read/write vulnerabilities in its VMware vSphere ESXi (ESXi), VMware Workstation Pro/Player (Workstation), and VMware Fusion Pro/Fusion (Fusion).
VMware ESXi, Workstation and Fusion contain out-of-bounds read/write vulnerabilities in the pixel shader functionality. VMware has evaluated the severity of these issues to be in the Important severity range with a maximum CVSSv3 base score of 8.5. Piotr Bania of Cisco Talos discovered the issues.
Exploiting these issues would require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
Successful exploitation of the out-of-bounds read issue (CVE-2019-5521) may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on the host.
The out-of-bounds write issue (CVE-2019-5684) can be exploited only if the host has an affected NVIDIA graphics driver. Successful exploitation of this issue may lead to code execution on the host. Users should check NVIDIA security advisory for additional information.
In addition to the patches provided, CVE-2019-5684 can end up remediated by installing the updated NVIDIA graphics driver.
A workaround for these issues involves disabling the 3D-acceleration feature.
The following are fixed version of affected software:
VMware Workstation Pro 14.1.6, 15.0.3
VMware Workstation Player 14.1.6, 15.0.3
VMware Fusion Pro/Fusion 10.1.6, 11.0.3