Vulnerabilities > CVE-2012-3569 - Use of Externally-Controlled Format String vulnerability in VMWare OVF Tool, Player and Workstation

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
vmware
CWE-134
nessus
exploit available
metasploit

Summary

Format string vulnerability in VMware OVF Tool 2.1 on Windows, as used in VMware Workstation 8.x before 8.0.5, VMware Player 4.x before 4.0.5, and other products, allows user-assisted remote attackers to execute arbitrary code via a crafted OVF file.

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Format String Injection
    An attacker includes formatting characters in a string input field on the target application. Most applications assume that users will provide static text and may respond unpredictably to the presence of formatting character. For example, in certain functions of the C programming languages such as printf, the formatting character %s will print the contents of a memory location expecting this location to identify a string and the formatting character %n prints the number of DWORD written in the memory. An attacker can use this to read or write to memory locations or files, or simply to manipulate the value of the resulting text in unexpected ways. Reading or writing memory may result in program crashes and writing memory could result in the execution of arbitrary code if the attacker can write to the program stack.
  • String Format Overflow in syslog()
    This attack targets the format string vulnerabilities in the syslog() function. An attacker would typically inject malicious input in the format string parameter of the syslog function. This is a common problem, and many public vulnerabilities and associated exploits have been posted.

Exploit-Db

  • descriptionVMWare OVF Tools Format String Vulnerability. CVE-2012-3569. Remote exploit for windows platform
    idEDB-ID:24461
    last seen2016-02-02
    modified2013-02-12
    published2013-02-12
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/24461/
    titleVMWare OVF Tools Format String Vulnerability
  • descriptionVMWare OVF Tools Format String Vulnerability. CVE-2012-3569. Remote exploit for windows platform
    idEDB-ID:24460
    last seen2016-02-02
    modified2013-02-06
    published2013-02-06
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/24460/
    titleVMWare OVF Tools Format String Vulnerability

Metasploit

Nessus

NASL familyWindows
NASL idVMWARE_OVFTOOL_VMSA_2012-0015.NASL
descriptionThe version of the VMware OVF Tool installed on the remote Windows host is potentially affected by a format string vulnerability. By tricking a user into loading a specially crafted OVF file a remote, unauthenticated attacker could execute arbitrary code on the remote host subject to the privileges of the user running the affected application.
last seen2020-06-01
modified2020-06-02
plugin id63075
published2012-11-28
reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/63075
titleVMware OVF Tool 2.1 File Handling Format String Vulnerability (VMSA-2012-0015)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(63075);
  script_version("1.11");
  script_cvs_date("Date: 2018/11/15 20:50:29");

  script_cve_id("CVE-2012-3569");
  script_bugtraq_id(56468);
  script_xref(name:"VMSA", value:"2012-0015");

  script_name(english:"VMware OVF Tool 2.1 File Handling Format String Vulnerability (VMSA-2012-0015)");
  script_summary(english:"Checks version of OVF Tool");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host has a tool installed that is affected by a
format string vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of the VMware OVF Tool installed on the remote Windows host
is potentially affected by a format string vulnerability.  By tricking a
user into loading a specially crafted OVF file a remote, unauthenticated
attacker could execute arbitrary code on the remote host subject to the
privileges of the user running the affected application.");
  script_set_attribute(attribute:"see_also", value:"https://www.vmware.com/security/advisories/VMSA-2012-0015.html");
  script_set_attribute(attribute:"see_also", value:"http://lists.vmware.com/pipermail/security-announce/2012/000193.html");
  script_set_attribute(attribute:"solution", value:"Upgrade to VMware OVF Tool 3.0.1 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");
  script_set_attribute(attribute:"exploited_by_malware", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'VMWare OVF Tools Format String Vulnerability');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2012/11/08");
  script_set_attribute(attribute:"patch_publication_date", value:"2012/11/08");
  script_set_attribute(attribute:"plugin_publication_date", value:"2012/11/28");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:vmware:ovf_tool");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.");

  script_dependencies("vmware_ovftool_installed.nasl");
  script_require_keys("SMB/VMware OVF Tool/Path", "SMB/VMware OVF Tool/Version");
  
  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

version = get_kb_item_or_exit("SMB/VMware OVF Tool/Version");
path = get_kb_item_or_exit("SMB/VMware OVF Tool/Path");

if (version !~ '^2\\.1') exit(0, "The VMware OVF Tool install under "+path+" is "+version+", not 2.1.");

fixed_version = '3.0.1';
if (ver_compare(ver:version, fix:fixed_version, strict:FALSE) < 0)
{
  port = get_kb_item('SMB/transport');

  if (report_verbosity > 0)
  {
    report +=
      '\n  Path              : ' + path +
      '\n  Installed version : ' + version +
      '\n  Fixed version     : ' + fixed_version +
      '\n';
    security_hole(port:port, extra:report);
  }
  else security_hole(port);
}
else audit(AUDIT_INST_VER_NOT_VULN, 'VMware OVF Tool', version);

Packetstorm

Saint

bid56468
descriptionVMware OVF Tool Format String
idmisc_vmwareplayerver
osvdb87117
titlevmware_ovf_tool_format_string
typeclient