VMware ESXi and ESX Local Privilege Escalation Vulnerability
21 Apr. 2012
Summary
VMware ESXi 3.5, 4.0, and 4.1 and ESX 3.5, 4.0, and 4.1 do not properly implement port-based I/O operations, which allows guest OS users to gain guest OS privileges by overwriting memory locations in a read-only memory block associated with the Virtual DOS Machine.
VMware ESXi and ESX are prone to a local privilege-escalation vulnerability.
Local attackers can exploit this issue to execute arbitrary code with elevated privileges on a host running the affected applications. .
Vendor Status:
VMware had issued an update for this vulnerability