9
CVSSv2

CVE-2012-1516

Published: 04/05/2012 Updated: 27/09/2019
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 9.9 | Impact Score: 6 | Exploitability Score: 3.1
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

The VMX process in VMware ESXi 3.5 up to and including 4.1 and ESX 3.5 up to and including 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.

Vulnerable Product Search on Vulmon Subscribe to Product

vmware esx 4.0

vmware esx 4.1

vmware esx 3.5

vmware esxi 4.0

vmware esxi 4.1

vmware esxi 3.5

Exploits

The vulnerability described in this document could hypothetically be exploited by unprivileged code running in a VMware virtual machine (guest) in order to execute code in the host VMX process, thereby breaking out of the virtual machine; however, such exploitation has not been proven In the event that arbitrary code execution in the VMX process i ...