VMware ESXi and ESX RPC Command Handling Vulnerability

VMware ESXi and ESX RPC Command Handling Vulnerability

CVE-2012-1516 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.

Learn more about our Cis Benchmark Audit For Vmware.