VMware ESXi contains a memory corruption vulnerability that exists in the way it handles a network socket. A malicious actor with local access to ESXi may exploit this issue to corrupt memory leading to an escape of the ESXi sandbox.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.vmware.com/security/advisories/VMSA-2022-0030.html | patch vendor advisory |