CVE-2012-1516
04.05.2012, 16:55
The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.Enginsight
Vendor | Product | Version |
---|---|---|
vmware | esx | 3.5 |
vmware | esx | 3.5:update1 |
vmware | esx | 3.5:update2 |
vmware | esx | 3.5:update3 |
vmware | esx | 4.0 |
vmware | esx | 4.1 |
vmware | esxi | 3.5 |
vmware | esxi | 3.5:1 |
vmware | esxi | 4.0 |
vmware | esxi | 4.0:1 |
vmware | esxi | 4.0:2 |
vmware | esxi | 4.0:3 |
vmware | esxi | 4.0:4 |
vmware | esxi | 4.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References