Vulnerability CVE-2012-1515


Published: 2012-04-02

Description:
VMware ESXi 3.5, 4.0, and 4.1 and ESX 3.5, 4.0, and 4.1 do not properly implement port-based I/O operations, which allows guest OS users to gain guest OS privileges by overwriting memory locations in a read-only memory block associated with the Virtual DOS Machine.

See advisories in our WLB2 database:
Topic
Author
Date
High
VMware High-Bandwidth Backdoor ROM Overwrite Privilege Elevation
Derek Soeder
03.04.2012

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:A/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
8.3/10
10/10
6.5/10
Exploit range
Attack complexity
Authentication
Adjacent network
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Vmware -> ESX 
Vmware -> ESXI 

 References:
http://www.securityfocus.com/bid/52820
http://www.securitytracker.com/id?1026875
http://www.us-cert.gov/cas/techalerts/TA12-164A.html
http://www.vmware.com/security/advisories/VMSA-2012-0006.html
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-042
https://exchange.xforce.ibmcloud.com/vulnerabilities/74480
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15209
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17110

Copyright 2024, cxsecurity.com

 

Back to Top