The VMX process in VMware ESXi 4.1 and ESX 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving function pointers.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T19:01:02.411Z
Reserved: 2012-03-08T00:00:00
Link: CVE-2012-1517

No data.

Status : Modified
Published: 2012-05-04T16:55:01.450
Modified: 2024-11-21T01:37:08.660
Link: CVE-2012-1517

No data.