Vulnerabilities > CVE-2019-5535 - Unspecified vulnerability in VMWare Fusion and Workstation

047910
CVSS 4.7 - MEDIUM
Attack vector
ADJACENT_NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
LOW
low complexity
vmware
nessus

Summary

VMware Workstation and Fusion contain a network denial-of-service vulnerability due to improper handling of certain IPv6 packets. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.7.

Nessus

  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_FUSION_VMSA_2019_0014.NASL
    descriptionThe version of VMware Fusion installed on the remote macOS or Mac OS X host is 11.0.x prior to 11.5.0. It is, therefore, affected by the following issues: - A use-after-free error in the virtual sound device that allows a local attacker on the guest machine with low privileges to execute code on the host. (CVE-2019-5527) - A denial of service vulnerability caused by improper handling of some IPv6 packets. An attacker can exploit this vulnerability to disallow network access for all guest machines using the VMware NAT mode. To exploit this vulnerability, the attacker must send specially crafted IPv6 packets from a guest machine when IPv6 mode for VMNAT is enabled. (CVE-2019-5535) Note that Nessus has not tested for these issues but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id129496
    published2019-10-02
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/129496
    titleVMware Fusion 11.0.x < 11.5.0 Multiple Vulnerabilities (VMSA-2019-0014)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(129496);
      script_version("1.4");
      script_cvs_date("Date: 2019/10/31 15:18:51");
    
      script_cve_id("CVE-2019-5527", "CVE-2019-5535");
      script_xref(name:"VMSA", value:"2019-0014");
      script_xref(name:"IAVA", value:"2019-A-0344");
    
      script_name(english:"VMware Fusion 11.0.x < 11.5.0 Multiple Vulnerabilities (VMSA-2019-0014)");
    
      script_set_attribute(attribute:"synopsis", value:
    "A virtualization application installed on the remote macOS or Mac OS X host is affected by multiple vulnerabilities");
      script_set_attribute(attribute:"description", value:
    "The version of VMware Fusion installed on the remote macOS or Mac OS X host is 11.0.x prior to 11.5.0. It is, therefore,
    affected by the following issues:
    
      - A use-after-free error in the virtual sound device that
        allows a local attacker on the guest machine with low
        privileges to execute code on the host. (CVE-2019-5527)
    
      - A denial of service vulnerability caused by improper
        handling of some IPv6 packets. An attacker can exploit
        this vulnerability to disallow network access for all
        guest machines using the VMware NAT mode. To exploit
        this vulnerability, the attacker must send specially
        crafted IPv6 packets from a guest machine when IPv6 mode
        for VMNAT is enabled. (CVE-2019-5535)
    
    Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
    number.");
      script_set_attribute(attribute:"see_also", value:"https://www.vmware.com/security/advisories/VMSA-2019-0014.html");
      script_set_attribute(attribute:"solution", value:
    "Update to VMware Fusion version 11.5.0, or later.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-5527");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/09/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/09/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/10/02");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:vmware:fusion");
      script_set_attribute(attribute:"stig_severity", value:"I");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("macosx_fusion_detect.nasl");
      script_require_keys("Host/local_checks_enabled", "installed_sw/VMware Fusion");
    
      exit(0);
    }
    
    include('vcf.inc');
    
    
    app_info = vcf::get_app_info(app:'VMware Fusion');
    
    constraints = [
      { 'min_version' : '11.0', 'fixed_version' : '11.5.0' }
    ];
    
    vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
    
  • NASL familyGeneral
    NASL idVMWARE_WORKSTATION_VMSA_2019_0014.NASL
    descriptionThe version of VMware Workstation installed on the remote host is 15.0.x prior to 15.5.0. It is, therefore, affected by the following issues: - A use-after-free error in the virtual sound device that allows a local attacker on the guest machine with low privileges to execute code on the host. (CVE-2019-5527) - A denial of service vulnerability caused by improper handling of some IPv6 packets. An attacker can exploit this vulnerability to disallow network access for all guest machines using the VMware NAT mode. To exploit this vulnerability, the attacker must send specially crafted IPv6 packets from a guest machine when IPv6 mode for VMNAT is enabled. (CVE-2019-5535) Note that Nessus has not tested for these issues but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id129495
    published2019-10-02
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/129495
    titleVMware Workstation 15.0.x < 15.5.0 Multiple Vulnerabilities (VMSA-2019-0014)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(129495);
      script_version("1.5");
      script_cvs_date("Date: 2019/10/31 15:18:51");
    
      script_cve_id("CVE-2019-5527", "CVE-2019-5535");
      script_xref(name:"VMSA", value:"2019-0014");
      script_xref(name:"IAVA", value:"2019-A-0344");
    
      script_name(english:"VMware Workstation 15.0.x < 15.5.0 Multiple Vulnerabilities (VMSA-2019-0014)");
    
      script_set_attribute(attribute:"synopsis", value:
    "A virtualization application installed on the remote host is affected by multiple vulnerabilities");
      script_set_attribute(attribute:"description", value:
    "The version of VMware Workstation installed on the remote host is 15.0.x prior to 15.5.0. It is, therefore, affected by
    the following issues:
    
      - A use-after-free error in the virtual sound device that
        allows a local attacker on the guest machine with low
        privileges to execute code on the host. (CVE-2019-5527)
    
      - A denial of service vulnerability caused by improper
        handling of some IPv6 packets. An attacker can exploit
        this vulnerability to disallow network access for all
        guest machines using the VMware NAT mode. To exploit
        this vulnerability, the attacker must send specially
        crafted IPv6 packets from a guest machine when IPv6 mode
        for VMNAT is enabled. (CVE-2019-5535)
    
    Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
    number.");
      script_set_attribute(attribute:"see_also", value:"https://www.vmware.com/security/advisories/VMSA-2019-0014.html");
      script_set_attribute(attribute:"solution", value:
    "Update to VMware Workstation version 15.5.0, or later.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-5527");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/09/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/09/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/10/02");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:vmware:workstation");
      script_set_attribute(attribute:"stig_severity", value:"I");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"General");
    
      script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("vmware_workstation_detect.nasl", "vmware_workstation_linux_installed.nbin");
      script_require_keys("installed_sw/VMware Workstation");
    
      exit(0);
    }
    
    include('vcf.inc');
    
    if (get_kb_item("SMB/Registry/Enumerated")) win_local = TRUE;
    
    app_info = vcf::get_app_info(app:'VMware Workstation', win_local:win_local);
    
    constraints = [
      { 'min_version' : '15.0', 'fixed_version' : '15.5.0' }
    ];
    
    vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);