Multiple vulnerabilities in AMD ATI Radeon driver for VMware Workstation



Published: 2020-01-22 | Updated: 2020-01-22
Risk High
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2019-5124
CVE-2019-5147
CVE-2019-5183
CVE-2019-5146
CWE-ID CWE-476
CWE-125
CWE-843
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
ATIDXX64.DLL
Hardware solutions / Drivers

Vendor AMD

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) NULL pointer dereference

EUVDB-ID: #VU24484

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-5124

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in shader functionality constant buffer. A remote attacker can send a specially crafted pixel shader and perform a denial of service (DoS) attack.

This vulnerability affects the following product:

AMD ATIDXX64.DLL (26.20.13001.50005) running on Radeon RX 550 / 550 Series VMware Workstation 15 (15.1.0 build-13591040) with Windows 10 x64 as guestVM

Mitigation

Vendor recommends to update on version 15.5.1 with 20.1.1 AMD drivers.

Vulnerable software versions

ATIDXX64.DLL: 26.20.13001.50005

External links

http://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0913


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds read

EUVDB-ID: #VU24483

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-5147

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in the MOVC instruction within the shader functionality. A remote attacker can send a specially crafted pixel shader, trigger out-of-bounds read error and cause a denial of service condition on the target system.

This vulnerability affects the following product:

AMD ATIDXX64.DLL (26.20.13003.1007) running on Radeon RX 550 / 550 Series VMware Workstation 15 (15.5.0 build-14665864) with Windows 10 x64 as guestVM

Mitigation

Vendor recommends to update on version 15.5.1 with 20.1.1 AMD drivers.

Vulnerable software versions

ATIDXX64.DLL: 26.20.13003.1007

External links

http://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0936


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Type Confusion

EUVDB-ID: #VU24482

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-5183

CWE-ID: CWE-843 - Type confusion

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a type confusion error in the shader functionality. A remote attacker can send a specially crafted pixel shader, trigger a vtable type confusion error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

This vulnerability affects the following product:

AMD ATIDXX64.DLL (26.20.13031.10003, 26.20.13031.15006, 26.20.13031.18002) running on Radeon RX 550 / 550 Series VMware Workstation 15 (15.5.0 build-14665864) with Windows 10 x64 as guestVM

Mitigation

Vendor recommends to update on version 15.5.1 with 20.1.1 AMD drivers.

Vulnerable software versions

ATIDXX64.DLL: 26.20.13031.10003 - 26.20.13031.18002

External links

http://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0964


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds read

EUVDB-ID: #VU24481

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-5146

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition shader functionality. A remote attacker can send a specially crafted pixel shader, trigger out-of-bounds read error and cause a denial of service condition on the target system.

This vulnerability affects the following product:

AMD ATIDXX64.DLL (26.20.13025.10004) running on Radeon RX 550 / 550 Series VMware Workstation 15 (15.5.0 build-14665864) with Windows 10 x64 as guestVM

Mitigation

Vendor recommends to update on version 15.5.1 with 20.1.1 AMD drivers.

Vulnerable software versions

ATIDXX64.DLL: 26.20.13025.10004

External links

http://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0937


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###