First published: Thu Jun 14 2012(Updated: )
VMware Workstation 7.x before 7.1.6 and 8.x before 8.0.4, VMware Player 3.x before 3.1.6 and 4.x before 4.0.4, VMware Fusion 4.x before 4.1.3, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow user-assisted remote attackers to execute arbitrary code on the host OS or cause a denial of service (memory corruption) on the host OS via a crafted Checkpoint file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation | =7.0 | |
VMware Workstation | =7.0.1 | |
VMware Workstation | =7.1 | |
VMware Workstation | =7.1.1 | |
VMware Workstation | =7.1.2 | |
VMware Workstation | =7.1.3 | |
VMware Workstation | =7.1.4 | |
VMware Workstation | =7.1.4.16648 | |
VMware Workstation | =7.1.5 | |
VMware Workstation | =8.0 | |
VMware Workstation | =8.0.1 | |
VMware Workstation | =8.0.2 | |
VMware Workstation | =8.0.3 | |
VMware Player | =3.0 | |
VMware Player | =3.0.1 | |
VMware Player | =3.1 | |
VMware Player | =3.1.1 | |
VMware Player | =3.1.2 | |
VMware Player | =3.1.3 | |
VMware Player | =3.1.4 | |
VMware Player | =3.1.5 | |
VMware Player | =4.0 | |
VMware Player | =4.0.1 | |
VMware Player | =4.0.2 | |
VMware Player | =4.0.3 | |
VMware Fusion Pro | =4.0 | |
VMware Fusion Pro | =4.0.1 | |
VMware Fusion Pro | =4.0.2 | |
VMware Fusion Pro | =4.1 | |
VMware Fusion Pro | =4.1.1 | |
VMware Fusion Pro | =4.1.2 | |
VMware ESX | =3.5 | |
VMware ESX | =3.5-update1 | |
VMware ESX | =3.5-update2 | |
VMware ESX | =3.5-update3 | |
VMware ESX | =4.0 | |
VMware ESX | =4.1 | |
VMware ESXi | =3.5 | |
VMware ESXi | =3.5-1 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.0-1 | |
VMware ESXi | =4.0-2 | |
VMware ESXi | =4.0-3 | |
VMware ESXi | =4.0-4 | |
VMware ESXi | =4.1 | |
VMware ESXi | =4.1-1 | |
VMware ESXi | =4.1-2 | |
VMware ESXi | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3288 is rated as a critical vulnerability that allows remote attackers to execute arbitrary code on the host OS.
To fix CVE-2012-3288, upgrade to VMware Workstation 7.1.6 or 8.0.4, VMware Player 3.1.6 or 4.0.4, VMware Fusion 4.1.3, or apply the necessary patches on affected versions.
VMware Workstation 7.x before 7.1.6, 8.x before 8.0.4, VMware Player 3.x before 3.1.6 and 4.x before 4.0.4, and VMware Fusion 4.x before 4.1.3 are affected.
No, CVE-2012-3288 requires user-assisted exploitation for remote attackers to execute arbitrary code.
VMware ESXi 3.5 through 5.0 and VMware ESX 3.5 through 4.1 systems are also vulnerable due to CVE-2012-3288.