HIGH · 9.0

CVE-2012-1517

The VMX process in VMware ESXi 4.1 and ESX 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute ...

Vulnerability Description

The VMX process in VMware ESXi 4.1 and ESX 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving function pointers.

CVSS Score

9.0

HIGH

AV:N/AC:L/Au:S/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
VmwareEsx4.1
VmwareEsxi4.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2012-1517?

CVE-2012-1517 is a vulnerability with a CVSS score of 9.0 (HIGH). The VMX process in VMware ESXi 4.1 and ESX 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute ...

How severe is CVE-2012-1517?

CVE-2012-1517 has been rated HIGH with a CVSS base score of 9.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2012-1517?

Check the references section above for vendor advisories and patch information. Affected products include: Vmware Esx, Vmware Esxi.