Computer Security
[EN] securityvulns.ru no-pyccku


VMWare privilege escalation
updated since 02.04.2012
Published:09.04.2012
Source:
SecurityVulns ID:12293
Type:local
Threat Level:
7/10
Description:It's possible to manipulate emulated ROM via backdoor interface.
Affected:VMWARE : VMware Server 1.0
 VMWARE : VMware ESXi 3.5
 VMWARE : VMware Server 2.0
 VMWARE : VMware Workstation 7.1
 VMWARE : VMware ESXi 4.1
CVE:CVE-2012-1515 (VMware ESXi 3.5, 4.0, and 4.1 and ESX 3.5, 4.0, and 4.1 do not properly implement port-based I/O operations, which allows guest OS users to gain guest OS privileges by overwriting memory locations in a read-only memory block associated with the Virtual DOS Machine.)
Original documentdocumentVMWARE, VMSA-2012-0006 VMware ESXi and ESX address several security issues (09.04.2012)
 documentds.adv.pub_(at)_gmail.com, VMware High-Bandwidth Backdoor ROM Overwrite Privilege Elevation (02.04.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod