Show plain JSON{"id": "CVE-2012-3569", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2012-11-14T12:30:59.257", "references": [{"url": "http://osvdb.org/87117", "source": "cve@mitre.org"}, {"url": "http://packetstormsecurity.com/files/120101/VMWare-OVF-Tools-Format-String.html", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/51240", "source": "cve@mitre.org"}, {"url": "http://technet.microsoft.com/en-us/security/msvr/msvr13-002", "source": "cve@mitre.org"}, {"url": "http://www.vmware.com/security/advisories/VMSA-2012-0015.html", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79922", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/87117", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://packetstormsecurity.com/files/120101/VMWare-OVF-Tools-Format-String.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/51240", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://technet.microsoft.com/en-us/security/msvr/msvr13-002", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vmware.com/security/advisories/VMSA-2012-0015.html", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79922", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-134"}]}], "descriptions": [{"lang": "en", "value": "Format string vulnerability in VMware OVF Tool 2.1 on Windows, as used in VMware Workstation 8.x before 8.0.5, VMware Player 4.x before 4.0.5, and other products, allows user-assisted remote attackers to execute arbitrary code via a crafted OVF file."}, {"lang": "es", "value": "Vulnerabilidad de formato de cadena en VMware OVF Tool v2.1 en Windows, tal y como se utiliza en VMware Workstation v8x antes de v8.0.5, v4.x VMware Player antes de v4.0.5, y otros productos, permite ejecutar c\u00f3digo de su elecci\u00f3n a atacantes remotos asistidos por un usuario local a trav\u00e9s de un archivo OVF debidamente modificado.\r\n"}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:vmware:ovf_tool:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C11FA19-ABFD-4018-8356-F944EF4047F7"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:vmware:workstation:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCE22BB0-F375-4883-BF6C-5A6369694EF3"}, {"criteria": "cpe:2.3:a:vmware:workstation:8.0.0.18997:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01483038-BC89-44BA-B07B-362FC5D7E8C1"}, {"criteria": "cpe:2.3:a:vmware:workstation:8.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD913295-9302-425A-A9E1-B0DF76AD3069"}, {"criteria": "cpe:2.3:a:vmware:workstation:8.0.1.27038:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B671AC17-7064-4541-ADB3-FCD72109C766"}, {"criteria": "cpe:2.3:a:vmware:workstation:8.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51B6CAE2-A396-40C8-8FF0-D9EC64D5C9A0"}, {"criteria": "cpe:2.3:a:vmware:workstation:8.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21644868-F1B0-4A8E-BE73-4F42BEB8E834"}, {"criteria": "cpe:2.3:a:vmware:workstation:8.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4944D9B1-A48B-4F32-951E-BEC3FEAC45FE"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:vmware:player:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "535E3D3C-76A5-405A-8F9D-21A86ED31D07"}, {"criteria": "cpe:2.3:a:vmware:player:4.0.0.18997:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81AFBBE6-0B3B-44DB-BBEB-08C8B2C39038"}, {"criteria": "cpe:2.3:a:vmware:player:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D09D7FB-78EE-4168-996D-FD3CF2E187BD"}, {"criteria": "cpe:2.3:a:vmware:player:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "816F1646-A1C9-4E4A-BCE1-A34D00B51ABE"}, {"criteria": "cpe:2.3:a:vmware:player:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D5FD2D7-9928-437B-8988-4FC955DE4F84"}, {"criteria": "cpe:2.3:a:vmware:player:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2932689-76D4-4907-9CF9-AD8F6B801579"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}