This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of VMware Workstation. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the parsing of shader bytecode. By manipulating a document's elements, an attacker can trigger a read past the end of an allocated array. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the hypervisor.
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-19-369 is classified as medium due to its potential for sensitive information disclosure.
To fix ZDI-19-369, users should update VMware Workstation to the latest version provided by VMware.
ZDI-19-369 affects installations of VMware Workstation that are vulnerable to information disclosure when exploited by local attackers.
Exploiting ZDI-19-369 can potentially disclose sensitive information stored in the affected VMware Workstation installation.
No, remote access is not required to exploit ZDI-19-369; an attacker must have local access to execute low-privileged code.