Critical severity9.9NVD Advisory· Published May 4, 2012· Updated Apr 29, 2026
CVE-2012-1516
CVE-2012-1516
Description
The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.
Affected products
14cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*
- cpe:2.3:o:vmware:esx:3.5:update1:*:*:*:*:*:*
- cpe:2.3:o:vmware:esx:3.5:update2:*:*:*:*:*:*
- cpe:2.3:o:vmware:esx:3.5:update3:*:*:*:*:*:*
- cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*+ 7 more
- cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- www.securityfocus.com/bid/53369nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/idnvdThird Party AdvisoryVDB Entry
- www.vmware.com/security/advisories/VMSA-2012-0009.htmlnvdVendor Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/75373nvdVDB Entry
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16810nvdTool Signature
News mentions
0No linked articles in our index yet.