cve/2019/CVE-2019-5516.md
2024-05-26 14:27:05 +02:00

20 lines
1.4 KiB
Markdown

### [CVE-2019-5516](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5516)
![](https://img.shields.io/static/v1?label=Product&message=ESXi&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Fusion&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Workstation&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Vertex%20shader%20out-of-bounds%20read%20vulnerability&color=brighgreen)
### Description
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds vulnerability with the vertex shader functionality. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/alphaSeclab/sec-daily-2019