1. downloads
  2. business software
  3. news
  4. reviews
  5. top apps
Download VMware Player 2.0.1

VMware Player 2.0.1

By VMware Inc  (Freeware)
User Rating
Advertisement

A virtual machine is a computer defined in software. It's like running a PC on your PC.

This free desktop virtualization software application makes it easy to operate any virtual machine created by VMware Workstation, VMware Fusion, VMware Server or VMware ESX.

Key Features Include:

  • Run multiple operating systems simultaneously on a single PC.
  • Experience the benefits of preconfigured products without any installation or configuration issues.
  • Share data between host computer and virtual machine.
  • Run both 32 and 64 bit virtual machines.
  • Leverage 2-way Virtual SMP.
  • Use 3rd-party virtual machines and images.
  • Share data between host computer and virtual machine.
  • Broad host and guest operating system support.
  • Support for USB 2.0 devices.
  • Get appliance info at start-up.
  • Gain easy access to virtual machines via intuitive home page interface.

VMware Player also supports Microsoft Virtual Server virtual machines or Microsoft Virtual PC virtual machines.

Title: VMware Player 2.0.1
Filename: VMware-player-2.0.1-55017.exe
File size: 172.92MB (181,315,232 bytes)
Requirements: Windows 2000 / XP / Vista / Windows 7 / XP 64-bit / Vista 64-bit / Windows 7 64-bit / Windows 8 / Windows 8 64-bit / Windows 10 / Windows 10 64-bit
Languages: Multiple languages
License: Freeware
Date added: September 19, 2007
Author: VMware Inc
www.vmware.com
MD5 Checksum: 7054EBA846201380085A7DAB9254D1E5

# This release fixes several security vulnerabilities in the VMware DHCP server that could enable a malicious web page to gain system-level privileges.
Thanks to Neel Mehta and Ryan Smith of the IBM Internet Security Systems X-Force for discovering and researching these vulnerabilities.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the following names to these issues: CVE-2007-0061, CVE-2007-0062, CVE-2007-0063.
# This release fixes a security vulnerability that could allow a guest operating system user with administrative privileges to cause memory corruption in a host process, and thus potentially execute arbitrary code on the host. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the following name to this issue: CVE-2007-4496.
Thanks to Rafal Wojtczvk of McAfee for identifying and reporting this issue.
# This release fixes a security vulnerability that could allow a guest operating system user without administrator privileges to cause a host process to become unresponsive or exit unexpectedly, making the guest operating system unusable. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the following name to this issue: CVE-2007-4497.
Thanks to Rafal Wojtczvk of McAfee for identifying and reporting this issue.
# This release fixes a security vulnerability that could allow a malicious remote user to exploit the library file IntraProcessLogging.dll to overwrite files in a system.
Thanks to the Goodfellas Security Research Team for discovering and researching these vulnerabilities.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the following name to this issue: CVE-2007-4059.
# This release fixes a security vulnerability that could allow a malicious remote user to exploit the library file vielib.dll to overwrite files in a system.
Thanks to the Goodfellas Security Research Team for discovering and researching these vulnerabilities.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the following names to this issue: CVE-2007-4155.
# This release fixes a problem that prevented VMware Player from launching. This problem was accompanied by the error message VMware Player unrecoverable error: (player) Exception 0xc0000005 (access violation) has occurred. This problem could result in a security vulnerability from images stored in virtual machines downloaded by the user.
# This release fixes a security vulnerability in which VMware Player was starting registered Windows services such as the Authorization service with "bare" (unquoted) paths, such as c:\program files\vmware\.... Applications and services in Windows must be started with a quoted path. This vulnerability could allow a malicious user to escalate user privileges.
Thanks to Foundstone for discovering this vulnerability.

blog comments powered by Disqus