First published: Fri May 04 2012(Updated: )
The VMX process in VMware ESXi 4.1 and ESX 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving function pointers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESX | =4.1 | |
VMware ESXi | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1517 has a high severity rating due to its potential to cause a denial of service and execute arbitrary code.
To fix CVE-2012-1517, users should apply the latest patches or updates provided by VMware for ESXi and ESX 4.1.
CVE-2012-1517 specifically affects VMware ESXi 4.1 and VMware ESX 4.1.
Exploiting CVE-2012-1517 may lead to memory overwrite, crashes of the VMX process, or potentially arbitrary code execution on the host OS.
Organizations using affected versions of VMware ESXi and ESX are primarily at risk from CVE-2012-1517.