Vulnerabilities > CVE-2012-3569 - Use of Externally-Controlled Format String vulnerability in VMWare OVF Tool, Player and Workstation
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Format string vulnerability in VMware OVF Tool 2.1 on Windows, as used in VMware Workstation 8.x before 8.0.5, VMware Player 4.x before 4.0.5, and other products, allows user-assisted remote attackers to execute arbitrary code via a crafted OVF file.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Format String Injection An attacker includes formatting characters in a string input field on the target application. Most applications assume that users will provide static text and may respond unpredictably to the presence of formatting character. For example, in certain functions of the C programming languages such as printf, the formatting character %s will print the contents of a memory location expecting this location to identify a string and the formatting character %n prints the number of DWORD written in the memory. An attacker can use this to read or write to memory locations or files, or simply to manipulate the value of the resulting text in unexpected ways. Reading or writing memory may result in program crashes and writing memory could result in the execution of arbitrary code if the attacker can write to the program stack.
- String Format Overflow in syslog() This attack targets the format string vulnerabilities in the syslog() function. An attacker would typically inject malicious input in the format string parameter of the syslog function. This is a common problem, and many public vulnerabilities and associated exploits have been posted.
Exploit-Db
description VMWare OVF Tools Format String Vulnerability. CVE-2012-3569. Remote exploit for windows platform id EDB-ID:24461 last seen 2016-02-02 modified 2013-02-12 published 2013-02-12 reporter metasploit source https://www.exploit-db.com/download/24461/ title VMWare OVF Tools Format String Vulnerability description VMWare OVF Tools Format String Vulnerability. CVE-2012-3569. Remote exploit for windows platform id EDB-ID:24460 last seen 2016-02-02 modified 2013-02-06 published 2013-02-06 reporter metasploit source https://www.exploit-db.com/download/24460/ title VMWare OVF Tools Format String Vulnerability
Metasploit
description This module exploits a format string vulnerability in VMWare OVF Tools 2.1 for Windows. The vulnerability occurs when printing error messages while parsing a a malformed OVF file. The module has been tested successfully with VMWare OVF Tools 2.1 on Windows XP SP3. id MSF:EXPLOIT/WINDOWS/BROWSER/OVFTOOL_FORMAT_STRING last seen 2020-06-01 modified 2017-07-24 published 2013-02-04 references reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/ovftool_format_string.rb title VMWare OVF Tools Format String Vulnerability description This module exploits a format string vulnerability in VMWare OVF Tools 2.1 for Windows. The vulnerability occurs when printing error messages while parsing a a malformed OVF file. The module has been tested successfully with VMWare OVF Tools 2.1 on Windows XP SP3. id MSF:EXPLOIT/WINDOWS/FILEFORMAT/OVF_FORMAT_STRING last seen 2020-05-01 modified 2017-07-24 published 2013-02-04 references reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/fileformat/ovf_format_string.rb title VMWare OVF Tools Format String Vulnerability
Nessus
NASL family | Windows |
NASL id | VMWARE_OVFTOOL_VMSA_2012-0015.NASL |
description | The version of the VMware OVF Tool installed on the remote Windows host is potentially affected by a format string vulnerability. By tricking a user into loading a specially crafted OVF file a remote, unauthenticated attacker could execute arbitrary code on the remote host subject to the privileges of the user running the affected application. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 63075 |
published | 2012-11-28 |
reporter | This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/63075 |
title | VMware OVF Tool 2.1 File Handling Format String Vulnerability (VMSA-2012-0015) |
code |
|
Packetstorm
data source https://packetstormsecurity.com/files/download/120101/ovf_format_string.rb.txt id PACKETSTORM:120101 last seen 2016-12-05 published 2013-02-06 reporter Jeremy Brown source https://packetstormsecurity.com/files/120101/VMWare-OVF-Tools-Format-String.html title VMWare OVF Tools Format String data source https://packetstormsecurity.com/files/download/120102/ovftool_format_string.rb.txt id PACKETSTORM:120102 last seen 2016-12-05 published 2013-02-06 reporter Jeremy Brown source https://packetstormsecurity.com/files/120102/VMWare-OVF-Tools-Format-String.html title VMWare OVF Tools Format String
Saint
bid | 56468 |
description | VMware OVF Tool Format String |
id | misc_vmwareplayerver |
osvdb | 87117 |
title | vmware_ovf_tool_format_string |
type | client |
References
- http://www.vmware.com/security/advisories/VMSA-2012-0015.html
- http://packetstormsecurity.com/files/120101/VMWare-OVF-Tools-Format-String.html
- http://secunia.com/advisories/51240
- http://osvdb.org/87117
- http://technet.microsoft.com/en-us/security/msvr/msvr13-002
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79922