CVE-2012-1515

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

VMware ESXi 3.5, 4.0, and 4.1 and ESX 3.5, 4.0, and 4.1 do not properly implement port-based I/O operations, which allows guest OS users to gain guest OS privileges by overwriting memory locations in a read-only memory block associated with the Virtual DOS Machine.

References

http://www.securityfocus.com/bid/52820

http://www.securitytracker.com/id?1026875

http://www.us-cert.gov/cas/techalerts/TA12-164A.html

http://www.vmware.com/security/advisories/VMSA-2012-0006.html

https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-042

https://exchange.xforce.ibmcloud.com/vulnerabilities/74480

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15209

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17110

Details

Source: MITRE

Published: 2012-04-02

Updated: 2018-10-12

Type: CWE-264

Risk Information

CVSS v2

Base Score: 8.3

Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 6.5

Severity: HIGH

Tenable Plugins

View all (3 total)

IDNameProductFamilySeverity
89107VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2012-0006) (remote check)NessusMisc.
critical
59460MS12-042: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2711167)NessusWindows : Microsoft Bulletins
high
58535VMSA-2012-0006 : VMware Workstation, ESXi, and ESX address several security issuesNessusVMware ESX Local Security Checks
high