New Search

VMware host memory overwrite vulnerability (function pointers)

oval:org.mitre.oval:def:17231

The VMX process in VMware ESXi 4.1 and ESX 4.1 does not properly handle RPC commands which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving function pointers.

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows XP
  • Microsoft Windows Server 2003
  • Microsoft Windows Vista
  • Microsoft Windows Server 2008
  • Microsoft Windows Server 2008 R2
  • Microsoft Windows 7
Class:
vulnerability
Reference(s):
  • CVE-2012-1517
Product(s):
  • VMware Workstation
  • VMware Player