Vulnerability Description
The VMX process in VMware ESXi 4.1 and ESX 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving function pointers.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vmware | Esx | 4.1 |
| Vmware | Esxi | 4.1 |
Related Weaknesses (CWE)
References
- http://osvdb.org/81692
- http://www.securityfocus.com/bid/53369
- http://www.securitytracker.com/id?1027018
- http://www.vmware.com/security/advisories/VMSA-2012-0009.htmlVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75374
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://osvdb.org/81692
- http://www.securityfocus.com/bid/53369
- http://www.securitytracker.com/id?1027018
- http://www.vmware.com/security/advisories/VMSA-2012-0009.htmlVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75374
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
FAQ
What is CVE-2012-1517?
CVE-2012-1517 is a vulnerability with a CVSS score of 9.0 (HIGH). The VMX process in VMware ESXi 4.1 and ESX 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute ...
How severe is CVE-2012-1517?
CVE-2012-1517 has been rated HIGH with a CVSS base score of 9.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-1517?
Check the references section above for vendor advisories and patch information. Affected products include: Vmware Esx, Vmware Esxi.