First published: Wed Nov 14 2012(Updated: )
Format string vulnerability in VMware OVF Tool 2.1 on Windows, as used in VMware Workstation 8.x before 8.0.5, VMware Player 4.x before 4.0.5, and other products, allows user-assisted remote attackers to execute arbitrary code via a crafted OVF file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VMware OVF Tool | =2.1 | |
Microsoft Windows | ||
VMware Workstation | =8.0 | |
VMware Workstation | =8.0.0.18997 | |
VMware Workstation | =8.0.1 | |
VMware Workstation | =8.0.1.27038 | |
VMware Workstation | =8.0.2 | |
VMware Workstation | =8.0.3 | |
VMware Workstation | =8.0.4 | |
VMware Player | =4.0 | |
VMware Player | =4.0.0.18997 | |
VMware Player | =4.0.1 | |
VMware Player | =4.0.2 | |
VMware Player | =4.0.3 | |
VMware Player | =4.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3569 is considered a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2012-3569, users should update VMware OVF Tool to version 2.1.0.5 or later, and upgrade affected VMware Workstation and Player versions.
CVE-2012-3569 affects VMware OVF Tool 2.1, VMware Workstation 8.x before 8.0.5, and VMware Player 4.x before 4.0.5.
Yes, CVE-2012-3569 can be exploited by remote attackers through the use of a specially crafted OVF file.
CVE-2012-3569 impacts Windows platforms specifically when using the affected VMware products.