SynopsisA virtualization application installed on the remote Windows host is affected by an uninitialized stack memory usage vulnerability.
DescriptionThe version of VMware Workstation installed on the remote host is 14.x prior to 14.1.4 or 15.x prior to 15.0.1. It is, therefore, affected by multiple vulnerabilities, including:
- An out-of-bounds read/write vulnerability and a Time-of-check Time-of-use (TOCTOU) vulnerability in the virtual USB 1.1 UHCI (Universal Host Controller Interface). Exploitation of these issues requires an attacker to have access to a virtual machine with a virtual USB controller present. These issues may allow a guest to execute code on the host. (CVE-2019-5518, CVE-2019-5519)
- An out-of-bounds write vulnerability in the e1000 virtual network adapter. This issue may allow a guest to execute code on the host. (CVE-2019-5524)
- An out-of-bounds write vulnerability in the e1000 and e1000e virtual network adapters. Exploitation of this issue may lead to code execution on the host from the guest but it is more likely to result in a denial of service of the guest. (CVE-2019-5515)
Note that CVE-2019-5524 only applies to VMware Workstation 14.x and was fixed in 14.1.6.
Note that CVE-2019-5515 was fixed in 14.1.6 and 15.0.3.
SolutionUpgrade to VMware Workstation version 14.1.7, 15.0.4, or later.