{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T11:26:23.715","vulnerabilities":[{"cve":{"id":"CVE-2019-5049","sourceIdentifier":"talos-cna@cisco.com","published":"2019-10-31T20:15:11.257","lastModified":"2024-11-21T04:44:14.950","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An exploitable memory corruption vulnerability exists in AMD ATIDXX64.DLL driver, versions 25.20.15031.5004 and 25.20.15031.9002. A specially crafted pixel shader can cause an out-of-bounds memory write. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host."},{"lang":"es","value":"Se presenta una vulnerabilidad de corrupción de memoria explotable en el controlador AMD ATIDXX64.DLL, versiones 25.20.15031.5004 y 25.20.15031.9002. Un sombreador de píxeles especialmente diseñado puede causar una escritura de memoria fuera de límites. Un atacante puede proveer un archivo de sombreador especialmente diseñado para activar esta vulnerabilidad. Esta vulnerabilidad puede ser activada desde el invitado de VMware, afectando al host de VMware."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:amd:radeon_rx_550_firmware:25.20.15031.5004:*:*:*:*:*:*:*","matchCriteriaId":"8BC742FD-ECF0-4547-8F3E-D9A7116C92C3"},{"vulnerable":true,"criteria":"cpe:2.3:o:amd:radeon_rx_550_firmware:25.20.15031.9002:*:*:*:*:*:*:*","matchCriteriaId":"AD8D6240-7843-4CE8-9DA8-40650EBC4C76"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:amd:radeon_rx_550:-:*:*:*:*:*:*:*","matchCriteriaId":"59243C37-3522-4295-901A-B04D2D72D7A3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:amd:radeon_550_firmware:25.20.15031.5004:*:*:*:*:*:*:*","matchCriteriaId":"A5D3DEF9-52E6-43F9-96E4-17A0AF6C7BC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:amd:radeon_550_firmware:25.20.15031.9002:*:*:*:*:*:*:*","matchCriteriaId":"08191311-9E72-4D36-A772-8A3F50412A33"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:amd:radeon_550:-:*:*:*:*:*:*:*","matchCriteriaId":"5084CEE6-8FFF-41A3-9346-4B4DE5F6C16B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:amd:radeon_rx_550x_firmware:25.20.15031.5004:*:*:*:*:*:*:*","matchCriteriaId":"DC399CAC-F513-4F43-819E-8C0C68814274"},{"vulnerable":true,"criteria":"cpe:2.3:o:amd:radeon_rx_550x_firmware:25.20.15031.9002:*:*:*:*:*:*:*","matchCriteriaId":"C08FA221-F19F-47E5-B09F-82292B5FB1F2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:amd:radeon_rx_550x:-:*:*:*:*:*:*:*","matchCriteriaId":"829918E7-5443-4834-84CB-72F3147711B7"}]}]}],"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2019-0818","source":"talos-cna@cisco.com","tags":["Third Party Advisory"]},{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2019-0818","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}