First published: Mon Apr 02 2012(Updated: )
VMware ESXi 3.5, 4.0, and 4.1 and ESX 3.5, 4.0, and 4.1 do not properly implement port-based I/O operations, which allows guest OS users to gain guest OS privileges by overwriting memory locations in a read-only memory block associated with the Virtual DOS Machine.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESXi | =3.5 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.1 | |
VMware ESX | =3.5 | |
VMware ESX | =4.0 | |
VMware ESX | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.