1. downloads
  2. business software
  3. news
  4. reviews
  5. top apps
Download VMware Player 4.0.3

VMware Player 4.0.3

By VMware Inc  (Freeware)
User Rating
Advertisement

A virtual machine is a computer defined in software. It's like running a PC on your PC.

This free desktop virtualization software application makes it easy to operate any virtual machine created by VMware Workstation, VMware Fusion, VMware Server or VMware ESX.

Key Features Include:

  • Run multiple operating systems simultaneously on a single PC.
  • Experience the benefits of preconfigured products without any installation or configuration issues.
  • Share data between host computer and virtual machine.
  • Run both 32 and 64 bit virtual machines.
  • Leverage 2-way Virtual SMP.
  • Use 3rd-party virtual machines and images.
  • Share data between host computer and virtual machine.
  • Broad host and guest operating system support.
  • Support for USB 2.0 devices.
  • Get appliance info at start-up.
  • Gain easy access to virtual machines via intuitive home page interface.

VMware Player also supports Microsoft Virtual Server virtual machines or Microsoft Virtual PC virtual machines.

Title: VMware Player 4.0.3
Filename: VMware-player-4.0.3-703057.exe
File size: 116.40MB (122,054,768 bytes)
Requirements: Windows 2000 / XP / Vista / Windows 7 / XP 64-bit / Vista 64-bit / Windows 7 64-bit / Windows 8 / Windows 8 64-bit / Windows 10 / Windows 10 64-bit
Languages: Multiple languages
License: Freeware
Date added: May 4, 2012
Author: VMware Inc
www.vmware.com
MD5 Checksum: F2259A257A5099CDCE5E1CE76512F599

# The following issues are resolved
* VMware floppy device out-of-bounds memory write
- Due to a flaw in the virtual floppy configuration it was possible to perform an out-of-bounds memory write. This vulnerability allowed a guest user to crash the VMX process or to potentially execute code on the host.
* VMware SCSI device unchecked memory write
- Due to a flaw in the SCSI device registration it was possible to perform an unchecked write into memory. This vulnerability allowed a guest user to crash the VMX process or to potentially execute code on the host.


blog comments powered by Disqus