Risk | High |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2019-5124 CVE-2019-5147 CVE-2019-5183 CVE-2019-5146 |
CWE-ID | CWE-476 CWE-125 CWE-843 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
ATIDXX64.DLL Hardware solutions / Drivers |
Vendor | AMD |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU24484
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-5124
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in shader functionality constant buffer. A remote attacker can send a specially crafted pixel shader and perform a denial of service (DoS) attack.
This vulnerability affects the following product:
AMD ATIDXX64.DLL (26.20.13001.50005) running on Radeon RX 550 / 550 Series VMware Workstation 15 (15.1.0 build-13591040) with Windows 10 x64 as guestVM
MitigationVendor recommends to update on version 15.5.1 with 20.1.1 AMD drivers.
Vulnerable software versionsATIDXX64.DLL: 26.20.13001.50005
External linkshttp://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0913
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU24483
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-5147
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in the MOVC instruction within the shader functionality. A remote attacker can send a specially crafted pixel shader, trigger out-of-bounds read error and cause a denial of service condition on the target system.
This vulnerability affects the following product:
AMD ATIDXX64.DLL (26.20.13003.1007) running on Radeon RX 550 / 550 Series VMware Workstation 15 (15.5.0 build-14665864) with Windows 10 x64 as guestVM
MitigationVendor recommends to update on version 15.5.1 with 20.1.1 AMD drivers.
Vulnerable software versionsATIDXX64.DLL: 26.20.13003.1007
External linkshttp://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0936
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU24482
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-5183
CWE-ID:
CWE-843 - Type confusion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a type confusion error in the shader functionality. A remote attacker can send a specially crafted pixel shader, trigger a vtable type confusion error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
This vulnerability affects the following product:
AMD ATIDXX64.DLL (26.20.13031.10003, 26.20.13031.15006, 26.20.13031.18002) running on Radeon RX 550 / 550 Series VMware Workstation 15 (15.5.0 build-14665864) with Windows 10 x64 as guestVM
MitigationVendor recommends to update on version 15.5.1 with 20.1.1 AMD drivers.
Vulnerable software versionsATIDXX64.DLL: 26.20.13031.10003 - 26.20.13031.18002
External linkshttp://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0964
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU24481
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-5146
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition shader functionality. A remote attacker can send a specially crafted pixel shader, trigger out-of-bounds read error and cause a denial of service condition on the target system.
This vulnerability affects the following product:
AMD ATIDXX64.DLL (26.20.13025.10004) running on Radeon RX 550 / 550 Series VMware Workstation 15 (15.5.0 build-14665864) with Windows 10 x64 as guestVM
MitigationVendor recommends to update on version 15.5.1 with 20.1.1 AMD drivers.
Vulnerable software versionsATIDXX64.DLL: 26.20.13025.10004
External linkshttp://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0937
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.