Описание
The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.
Ссылки
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- VDB Entry
- Tool Signature
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- VDB Entry
- Tool Signature
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:3.5:update1:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:3.5:update2:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:3.5:update3:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*
EPSS
Процентиль: 78%
0.01155
Низкий
9.9 Critical
CVSS3
9 Critical
CVSS2
Дефекты
CWE-119
Связанные уязвимости
CVSS3: 9.9
github
больше 3 лет назад
The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.
EPSS
Процентиль: 78%
0.01155
Низкий
9.9 Critical
CVSS3
9 Critical
CVSS2
Дефекты
CWE-119