Search the VMware Knowledge Base (KB)
View by Article ID

VMware ESX Server 3.0.3, ESX303-200904403-SG: Host code execution vulnerability from a guest operating system, vSMP virtual machines stop responding when network connection is intermittent (1008422)

  • 0 Ratings


Release Date: 04/10/09
Document Last Updated: 04/10/09


Product Versions
ESX Server 3.0.3
Patch Classification
Virtual Machine Migration or Reboot Required
ESX Server Host Reboot Required
PRs Fixed
356407, 377697
Affected Hardware
Affected Software

vCPUs and vSMP

RPMs Included
Related CVE numbers



This patch fixes the following issues:
  • vSMP virtual machines periodically stop responding due to deadlock situation happening between vCPUs and when network connection is intermittent.
  • critical vulnerability in the virtual machine display function might allow a guest operating system to run code on the host. The Common Vulnerabilities and Exposures project ( has assigned the name CVE-2009-1244 to this issue. 

Deployment Considerations


Patch Download and Installation     

Note: All virtual machines on the host must be either shut down or migrated using VMotion before applying the patch. 
See the VMware Update Manager Administration Guide for instructions on using VMware Update Manager to download and install patches to automatically update ESX Server 3.0.3 hosts.

To update ESX Server 3.0.3 hosts when not using VMware Update Manager, download the most recent patch bundle from and install the bundle using esxupdate from the command line of the host. For more information, see the ESX Server 3 Patch Management Guide .

Request a Product Feature

To request a new product feature or to provide feedback on a VMware product, please visit the Request a Product Feature page.


  • 0 Ratings

Did this article help you?
This article resolved my issue.
This article did not resolve my issue.
This article helped but additional information was required to resolve my issue.

What can we do to improve this information? (4000 or fewer characters)

Please enter the Captcha code before clicking Submit.
  • 0 Ratings