Input data is not properly validated when loading Checkpoint files. This may allow an attacker with the ability to load a specially crafted Checkpoint file to execute arbitrary code on the host.
Workaround - None identified
Mitigation - Do not import virtual machines from untrusted sources.
The Common Vulnerabilities and Exposures project ( cve.mitre.org) has assigned the name CVE-2012-3288 to this issue.
Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.