VMware Workstation 7.x before 7.1.6 and 8.x before 8.0.4, VMware Player 3.x before 3.1.6 and 4.x before 4.0.4, VMware Fusion 4.x before 4.1.3, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 allow user-assisted remote attackers to execute arbitrary code on the host OS or cause a denial of service (memory corruption) on the host OS via a crafted Checkpoint file.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
21 Nov 2024, 01:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.vmware.com/security/advisories/VMSA-2012-0011.html - Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17178 - |
Information
Published : 2012-06-14 20:55
Updated : 2024-11-21 01:40
NVD link : CVE-2012-3288
Mitre link : CVE-2012-3288
CVE.ORG link : CVE-2012-3288
JSON object : View
Products Affected
vmware
- player
- esxi
- esx
- fusion
- workstation
CWE
CWE-20
Improper Input Validation