First published: Thu Jun 14 2012(Updated: )
VMware Workstation 7.x before 7.1.6 and 8.x before 8.0.4, VMware Player 3.x before 3.1.6 and 4.x before 4.0.4, VMware Fusion 4.x before 4.1.3, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow user-assisted remote attackers to execute arbitrary code on the host OS or cause a denial of service (memory corruption) on the host OS via a crafted Checkpoint file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation | =7.0 | |
VMware Workstation | =7.0.1 | |
VMware Workstation | =7.1 | |
VMware Workstation | =7.1.1 | |
VMware Workstation | =7.1.2 | |
VMware Workstation | =7.1.3 | |
VMware Workstation | =7.1.4 | |
VMware Workstation | =7.1.4.16648 | |
VMware Workstation | =7.1.5 | |
VMware Workstation | =8.0 | |
VMware Workstation | =8.0.1 | |
VMware Workstation | =8.0.2 | |
VMware Workstation | =8.0.3 | |
VMware Player | =3.0 | |
VMware Player | =3.0.1 | |
VMware Player | =3.1 | |
VMware Player | =3.1.1 | |
VMware Player | =3.1.2 | |
VMware Player | =3.1.3 | |
VMware Player | =3.1.4 | |
VMware Player | =3.1.5 | |
VMware Player | =4.0 | |
VMware Player | =4.0.1 | |
VMware Player | =4.0.2 | |
VMware Player | =4.0.3 | |
VMware Fusion | =4.0 | |
VMware Fusion | =4.0.1 | |
VMware Fusion | =4.0.2 | |
VMware Fusion | =4.1 | |
VMware Fusion | =4.1.1 | |
VMware Fusion | =4.1.2 | |
VMware ESX | =3.5 | |
VMware ESX | =3.5-update1 | |
VMware ESX | =3.5-update2 | |
VMware ESX | =3.5-update3 | |
VMware ESX | =4.0 | |
VMware ESX | =4.1 | |
VMware ESXi | =3.5 | |
VMware ESXi | =3.5-1 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.0-1 | |
VMware ESXi | =4.0-2 | |
VMware ESXi | =4.0-3 | |
VMware ESXi | =4.0-4 | |
VMware ESXi | =4.1 | |
VMware ESXi | =4.1-1 | |
VMware ESXi | =4.1-2 | |
VMware ESXi | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.