First published: Fri May 04 2012(Updated: )
The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESX | =3.5 | |
VMware ESX | =3.5-update1 | |
VMware ESX | =3.5-update2 | |
VMware ESX | =3.5-update3 | |
VMware ESX | =4.0 | |
VMware ESX | =4.1 | |
VMware ESXi | =3.5 | |
VMware ESXi | =3.5-1 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.0-1 | |
VMware ESXi | =4.0-2 | |
VMware ESXi | =4.0-3 | |
VMware ESXi | =4.0-4 | |
VMware ESXi | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.