CVE-2012-1516 in ESXi
Zusammenfassung (Englisch)
The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.
If you want to get best quality of vulnerability data, you may have to visit VulDB.
Reservieren
08.03.2012
Veröffentlichung
04.05.2012
Status
Bestätigt
Einträge
VulDB provides additional information and datapoints for this CVE:
| ID | Schwachstelle | CWE | Aus | Mas | CVE |
|---|---|---|---|---|---|
| 5321 | VMware ESXi/ESX data pointers Pufferüberlauf | 119 | Nicht definiert | Offizieller Fix | CVE-2012-1516 |