CVE-2012-1515

VMware ESXi 3.5, 4.0, and 4.1 and ESX 3.5, 4.0, and 4.1 do not properly implement port-based I/O operations, which allows guest OS users to gain guest OS privileges by overwriting memory locations in a read-only memory block associated with the Virtual DOS Machine.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2012-04-02 10:46

Updated : 2023-12-10 11:16


NVD link : CVE-2012-1515

Mitre link : CVE-2012-1515

CVE.ORG link : CVE-2012-1515


JSON object : View

Products Affected

vmware

  • esxi
  • esx
CWE
CWE-264

Permissions, Privileges, and Access Controls