First published: Fri May 04 2012(Updated: )
The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESXi | =3.5 | |
VMware ESXi | =3.5-update1 | |
VMware ESXi | =3.5-update2 | |
VMware ESXi | =3.5-update3 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.1 | |
VMware ESXi | =3.5 | |
VMware ESXi | =3.5-1 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.0-1 | |
VMware ESXi | =4.0-2 | |
VMware ESXi | =4.0-3 | |
VMware ESXi | =4.0-4 | |
VMware ESXi | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1516 is considered a critical vulnerability due to its potential to allow denial of service and arbitrary code execution.
To fix CVE-2012-1516, update your VMware ESXi or ESX installations to the latest patched versions provided by VMware.
CVE-2012-1516 affects VMware ESXi versions 3.5 through 4.1 and ESX versions 3.5 through 4.1.
CVE-2012-1516 can cause a denial of service resulting in memory overwrite and process crashes, and it may allow for execution of arbitrary code on the host OS.
Organizations using the affected versions of VMware ESXi and ESX are at risk from CVE-2012-1516 and should take immediate action to mitigate it.