ASA-2019-00164 – VMware: UHCI out-of-bounds read/write and TOCTOU vulnerabilities


Allele Security Alert

ASA-2019-00164

Identifier(s)

ASA-2019-00164, CVE-2019-5518, CVE-2019-5519, VMSA-2019-0005

Title

UHCI out-of-bounds read/write and TOCTOU vulnerabilities

Vendor(s)

VMware

Product(s)

VMware vSphere ESXi (ESXi)
VMware Workstation Pro / Player (Workstation)
VMware Fusion Pro / Fusion (Fusion)

Affected version(s)

VMware vSphere ESXi (ESXi) versions 6.7, 6.5 and 6.0
VMware Workstation Pro / Player (Workstation) versions 15.x and 14.x
VMware Fusion Pro / Fusion (Fusion) running on OSX versions 11.x and 10.x

Fixed version(s)

VMware vSphere ESXi (ESXi) versions ESXi670-201903001, ESXi650-201903001 and ESXi600-201903001
VMware Workstation Pro / Player (Workstation) versions 15.0.4 and 14.1.7
VMware Fusion Pro / Fusion (Fusion) running on OSX versions 11.0.3 and 10.1.6

Proof of concept

Unknown

Description

VMware ESXi, Workstation and Fusion contain an out-of-bounds read/write vulnerability and a Time-of-check Time-of-use (TOCTOU) vulnerability in the virtual USB 1.1 UHCI (Universal Host Controller Interface). Exploitation of these issues requires an attacker to have access to a virtual machine with a virtual USB controller present. These issues may allow a guest to execute code on the host.

Technical details

Unknown

Credits

Amat Cama (Fluoroacetate team) and Richard Zhu (Fluoroacetate team)

Reference(s)

[Security-announce] New VMSA-2019-0005 – VMware ESXi, Workstation and Fusion updates address multiple security issues
https://lists.vmware.com/pipermail/security-announce/2019/000454.html

VMSA-2019-0005
https://www.vmware.com/security/advisories/VMSA-2019-0005.html

CVE-2019-5518
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5518

CVE-2019-5518
https://nvd.nist.gov/vuln/detail/CVE-2019-5518

CVE-2019-5519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5519

CVE-2019-5519
https://nvd.nist.gov/vuln/detail/CVE-2019-5519

If there is any error in this alert or you wish a comprehensive analysis, let us know.

Last modified: April 2, 2019

We are not responsible for any data loss, device corruption or any other type of issue due to the use of any information mentioned in our security alerts.