cpe:/o:vmware:esx:3.5 cpe:/o:vmware:esx:3.5:update1 cpe:/o:vmware:esx:3.5:update2 cpe:/o:vmware:esx:3.5:update3 cpe:/o:vmware:esx:4.0 cpe:/o:vmware:esx:4.1 cpe:/o:vmware:esxi:3.5 cpe:/o:vmware:esxi:3.5:1 cpe:/o:vmware:esxi:4.0 cpe:/o:vmware:esxi:4.0:1 cpe:/o:vmware:esxi:4.0:2 cpe:/o:vmware:esxi:4.0:3 cpe:/o:vmware:esxi:4.0:4 cpe:/o:vmware:esxi:4.1 CVE-2012-1516 2012-05-04T12:55:01.420-04:00 2019-09-27T14:13:22.970-04:00 9.0 NETWORK LOW SINGLE_INSTANCE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2019-09-27T09:20:09.067-04:00 SECTRACK 1027018 BID 53369 IAVM IAVM:2012-A-0071 IAVM IAVM:2012-A-0072 IAVM IAVM:2012-A-0073 CONFIRM http://www.vmware.com/security/advisories/VMSA-2012-0009.html XF vmware-esxserver-rpc-priv-esc(75373) The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.