Security vulnerabilities in some AMD ATI Radeon graphics cards could allow attackers to remotely execute code or cause a denial of service condition, researchers from Cisco Talos have warned.
A total of four security flaws were disclosed, all of them impacting the AMD ATIDXX64.DLL driver: three out-of-bounds bugs and one type confusion issue. All four issues have been patched by AMD.
Each of the first three vulnerabilities, which are tracked as CVE-2019-5124, CVE-2019-5147, and CVE-2019-5146, carry a CVSS score of 8.6.
To trigger these out-of-bounds security flaws, an attacker would need to supply a specially crafted, malformed pixel shader.
This type of attack, Cisco Talos explains in a vulnerability report, can be triggered from inside VMware guest usermode “to cause an out-of-bounds read in the vmware-vmx.exe process on host, or theoretically through WEBGL (remote website).”
Cisco’s researchers tested and confirmed these vulnerabilities in AMD ATIDXX64.DLL, version 26.20.13025.10004, running on Radeon RX 550 / 550 Series graphics cards, on VMware Workstation 15 with Windows 10 x64 as guestVM.
As for the fourth vulnerability, it impacts AMD ATIDXX64.DLL driver, versions 26.20.13031.10003, 26.20.13031.15006 and 26.20.13031.18002 (same graphics cards series and platform).
The type confusion issue can be caused by a specially crafted pixel shader and could lead to potential code execution. An attacker can trigger the flaw from the VMware guest by providing a specially crafted shader file.
“The vulnerability will be triggered in the vmware-vmx.exe process on host, or theoretically through WEBGL (remote website), leading to potential code execution (through a vtable type-confusion),” Cisco Talos explains.
Related: AMD Radeon Driver Flaw Leads to VM Escape
Related: Code Execution Vulnerabilities Patched in Accusoft ImageGear
Related: Hackers Can Target Able2Extract Users With Malicious Image Files

More from Ionut Arghire
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals
- Google Temporarily Offering $180,000 for Full Chain Chrome Exploit
- Toyota Discloses New Data Breach Involving Vehicle, Customer Information
- Adobe Inviting Researchers to Private Bug Bounty Program
- Critical Vulnerabilities Found in Faronics Education Software
Latest News
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
