CVE-2019-5520

CVSS V2 Medium 4.3 CVSS V3 Medium 5.9
Description
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds read vulnerability. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information disclosure.The workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.
Overview
  • CVE ID
  • CVE-2019-5520
  • Assigner
  • security@vmware.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2019-04-15T18:29:01
  • Last Modified Date
  • 2019-04-17T16:29:00
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:* 1 OR 10.0.0 10.1.6
cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:* 1 OR 11.0.0 11.0.3
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* 1 OR 14.0.0 14.1.6
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* 1 OR 15.0.0 15.0.3
cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:* 1 OR
cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:N/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • HIGH
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • NONE
  • Base Score
  • 5.9
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 2.2
  • Impact Score
  • 3.6
History
Created Old Value New Value Data Type Notes
2022-05-10 17:43:35 Added to TrackCVE
2022-12-03 19:36:47 2019-04-15T18:29Z 2019-04-15T18:29:01 CVE Published Date updated
2022-12-03 19:36:47 2019-04-17T16:29:00 CVE Modified Date updated
2022-12-03 19:36:47 Modified Vulnerability Status updated