The easiest, fastest and most reliable way to run Windows apps on a Mac

VMware Fusion for Mac

VMware Fusion 4.1.3 Build 730298

  -  182.02 MB  -  Trial

Sometimes latest versions of the software can cause issues when installed on older devices or devices running an older version of the operating system.

Software makers usually fix these issues but it can take them some time. What you can do in the meantime is to download and install an older version of VMware Fusion 4.1.3 Build 730298.


For those interested in downloading the most recent release of VMware Fusion for Mac or reading our review, simply click here.


All old versions distributed on our website are completely virus-free and available for download at no cost.


We would love to hear from you

If you have any questions or ideas that you want to share with us - head over to our Contact page and let us know. We value your feedback!

  • VMware Fusion 4.1.3 Build 730298 Screenshots

    The images below have been resized. Click on them to view the screenshots in full size.

    VMware Fusion 4.1.3 Build 730298 Screenshot 1
  • VMware Fusion 4.1.3 Build 730298 Screenshot 2
  • VMware Fusion 4.1.3 Build 730298 Screenshot 3
  • VMware Fusion 4.1.3 Build 730298 Screenshot 4
  • VMware Fusion 4.1.3 Build 730298 Screenshot 5

What's new in this version:

General Issues:
- Resolved an intermittent issue with an unreleased version of Mac OS X.
- Fixed a race-condition when starting VMware Tools in some OpenSUSE virtual machines.

Security Issues:
- VMware host Checkpoint file memory corruption
- Input data was not properly validated when loading Checkpoint files. This issue could have allowed an attacker with the ability to load a specially crafted Checkpoint file to execute arbitrary code on the host.
- The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-3288 to this issue.
- VMware floppy device out-of-bounds memory write.
- Due to a flaw in the virtual floppy configuration, it was possible to perform an out-of-bounds memory write. This vulnerability could have allowed a guest user to crash the VMX process or to potentially execute code on the host.
- The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-2449 to this issue.