VYPR
Critical severity9.9NVD Advisory· Published May 4, 2012· Updated Apr 29, 2026

CVE-2012-1516

CVE-2012-1516

Description

The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.

Affected products

14
  • VMware/Esx6 versions
    cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*+ 5 more
    • cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esx:3.5:update1:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esx:3.5:update2:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esx:3.5:update3:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*
  • VMware/Esxi8 versions
    cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*+ 7 more
    • cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*
    • cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.