CVE-2012-1516 in ESXiinfo

Zusammenfassung (Englisch)

The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.

If you want to get best quality of vulnerability data, you may have to visit VulDB.

Reservieren

08.03.2012

Veröffentlichung

04.05.2012

Status

Bestätigt

Einträge

VulDB provides additional information and datapoints for this CVE:

Quellen

Want to know what is going to be exploited?

We predict KEV entries!