9.9

CVE-2012-1516

The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.

Data is provided by the National Vulnerability Database (NVD)
VMwareEsx Version3.5
VMwareEsx Version3.5 Updateupdate1
VMwareEsx Version3.5 Updateupdate2
VMwareEsx Version3.5 Updateupdate3
VMwareEsx Version4.0
VMwareEsx Version4.1
VMwareESXi Version3.5
VMwareESXi Version3.5 Update1
VMwareESXi Version4.0
VMwareESXi Version4.0 Update1
VMwareESXi Version4.0 Update2
VMwareESXi Version4.0 Update3
VMwareESXi Version4.0 Update4
VMwareESXi Version4.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.16% 0.766
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.9 3.1 6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
nvd@nist.gov 9 8 10
AV:N/AC:L/Au:S/C:C/I:C/A:C
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.