Vulnerability Description
VMware ESX Server 1.5.2 before Patch 4 allows local users to execute arbitrary programs as root via certain modified VMware ESX Server environment variables.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vmware | Esx | 1.5.2 |
References
- http://www.osvdb.org/21585Patch
- http://www.vmware.com/download/esx/esx152-patch4.htmlPatch
- http://www.vmware.com/support/kb/enduser/std_adp.php?p_sid=dsxk%2ABWh&p_lva=&p_f
- http://www.osvdb.org/21585Patch
- http://www.vmware.com/download/esx/esx152-patch4.htmlPatch
- http://www.vmware.com/support/kb/enduser/std_adp.php?p_sid=dsxk%2ABWh&p_lva=&p_f
FAQ
What is CVE-2003-1291?
CVE-2003-1291 is a vulnerability with a CVSS score of 7.2 (HIGH). VMware ESX Server 1.5.2 before Patch 4 allows local users to execute arbitrary programs as root via certain modified VMware ESX Server environment variables.
How severe is CVE-2003-1291?
CVE-2003-1291 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-1291?
Check the references section above for vendor advisories and patch information. Affected products include: Vmware Esx.