Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-5147 : Vulnerability Insights and Analysis

Learn about CVE-2019-5147 affecting AMD ATIDXX64.DLL driver, version 26.20.13003.1007, allowing for a denial of service attack via a specially crafted pixel shader in VMware environments.

This CVE-2019-5147 vulnerability affects the AMD ATIDXX64.DLL driver, version 26.20.13003.1007, potentially leading to a denial of service attack when exploited through a specially crafted pixel shader.

Understanding CVE-2019-5147

This vulnerability allows for an exploitable out-of-bounds read, impacting systems running specific AMD and VMware configurations.

What is CVE-2019-5147?

CVE-2019-5147 is an out-of-bounds read vulnerability in the AMD ATIDXX64.DLL driver, version 26.20.13003.1007, which can be triggered by a specially designed pixel shader.

The Impact of CVE-2019-5147

The vulnerability can result in a denial of service attack when an attacker supplies a customized shader file, affecting systems utilizing VMware Workstation 15 with Windows 10 x64 as a guestVM.

Technical Details of CVE-2019-5147

This section provides detailed technical information about the vulnerability.

Vulnerability Description

The vulnerability in the AMD ATIDXX64.DLL driver, version 26.20.13003.1007, allows for an exploitable out-of-bounds read, enabling a denial of service attack.

Affected Systems and Versions

        Product: AMD
        Version: AMD ATIDXX64.DLL (26.20.13003.1007) running on Radeon RX 550 / 550 Series VMware Workstation 15 (15.5.0 build-14665864) with Windows 10 x64 as guestVM

Exploitation Mechanism

By using a specifically designed pixel shader, an attacker can trigger the vulnerability, potentially impacting the VMware host.

Mitigation and Prevention

Protecting systems from CVE-2019-5147 requires immediate actions and long-term security practices.

Immediate Steps to Take

        Apply security patches provided by AMD and VMware promptly.
        Monitor for any unusual shader file activities.

Long-Term Security Practices

        Regularly update and patch all software and drivers.
        Implement network segmentation to limit the impact of potential attacks.

Patching and Updates

        Stay informed about security updates from AMD and VMware.
        Ensure timely installation of patches to mitigate the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now