Executive Summary

Informations
NameCVE-2019-5520First vendor Publication2019-04-15
VendorCveLast vendor Modification2019-04-17

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:N/A:N)
Cvss Base Score4.3Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds read vulnerability. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information disclosure.The workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5520

CWE : Common Weakness Enumeration

%idName
100 %CWE-125Out-of-bounds Read

CPE : Common Platform Enumeration

TypeDescriptionCount
Os116

Sources (Detail)

SourceUrl
CONFIRM https://www.vmware.com/security/advisories/VMSA-2019-0006.html
MISC https://www.zerodayinitiative.com/advisories/ZDI-19-369/

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2019-04-17 21:19:24
  • Multiple Updates
2019-04-16 21:19:11
  • Multiple Updates
2019-04-16 00:19:01
  • First insertion