CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
72.3%
The VMX process in VMware ESXi 3.5 through 4.1 and ESX 3.5 through 4.1 does not properly handle RPC commands, which allows guest OS users to cause a denial of service (memory overwrite and process crash) or possibly execute arbitrary code on the host OS via vectors involving data pointers.
Vendor | Product | Version | CPE |
---|---|---|---|
vmware | esx | 3.5 | cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:* |
vmware | esx | 3.5 | cpe:2.3:o:vmware:esx:3.5:update1:*:*:*:*:*:* |
vmware | esx | 3.5 | cpe:2.3:o:vmware:esx:3.5:update2:*:*:*:*:*:* |
vmware | esx | 3.5 | cpe:2.3:o:vmware:esx:3.5:update3:*:*:*:*:*:* |
vmware | esx | 4.0 | cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:* |
vmware | esx | 4.1 | cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:* |
vmware | esxi | 3.5 | cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:* |
vmware | esxi | 3.5 | cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:* |
vmware | esxi | 4.0 | cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:* |
vmware | esxi | 4.0 | cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
72.3%