First published: Mon Apr 02 2012(Updated: )
VMware ESXi 3.5, 4.0, and 4.1 and ESX 3.5, 4.0, and 4.1 do not properly implement port-based I/O operations, which allows guest OS users to gain guest OS privileges by overwriting memory locations in a read-only memory block associated with the Virtual DOS Machine.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESXi | =3.5 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.1 | |
VMware ESX | =3.5 | |
VMware ESX | =4.0 | |
VMware ESX | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1515 has a high severity rating due to its potential to allow unauthorized privilege escalation within the guest OS.
CVE-2012-1515 allows guest OS users to overwrite memory locations in read-only memory blocks, leading to privilege escalation.
To fix CVE-2012-1515, it is recommended to apply the latest security patches provided by VMware for the affected versions.
CVE-2012-1515 affects VMware ESXi versions 3.5, 4.0, 4.1 and VMware ESX versions 3.5, 4.0, 4.1.
CVE-2012-1515 requires local access to the guest OS, thus it is not a remote exploit.