1. downloads
  2. business software
  3. news
  4. reviews
  5. top apps
Descargar VMware Player 1.0.4

VMware Player 1.0.4

Por VMware Inc  (Freeware)
Valoración de los usuarios
Publicidad

Una máquina virtual es un ordenador definido por software. Es como hacer funcionar un PC dentro de tu PC.

Esta aplicación gratuita de virtualización de escritorio hace más sencilla la operación con cualquier máquina virtual creada con VMware Workstation, VMware Fusion, VMware Server o VMware ESX, así como con máquinas virtuales de Microsoft Virtual Server o de Microsoft Virtual PC.

  • Ejecuta múltiples sistemas operativos de manera simultánea en un único PC
  • Experimenta los beneficios de los productos preconfigurados sin ningún tipo de inconveniente de instalación o configuración
  • Comparte datos entre servidores host y máquinas virtuales
  • Ejecuta máquinas virtuales de 32 y 64 bits
  • Mejora el SMP virtual de 2 vías
  • Utiliza máquinas virtuales e imágenes de otros proveedores
  • Amplio soporte para sistemas operativo de host e invitado
  • Soporte para dispositivos USB 2.0
  • Obtén información del dispositivo en el arranque
  • Ten fácil acceso a máquinas virtuales a través de intuitivos interfaces mediante páginas de inicio
Título: VMware Player 1.0.4
Nombre de fichero: VMware-player-1.0.4-44386.exe
Tamaño de fichero: 28.67MB (30,064,768 bytes)
Requisitos: Windows 2000 / XP / XP 64-bit / Windows 10 / Windows 10 64-bit
Idiomas: Múltiples idiomas
Licencia: Freeware
Fecha añadida: 27 de abril de 2007
Autor: VMware Inc
www.vmware.com
MD5 Checksum: 1E0014E6BA6CCF0C93769EA8424010E1

VMware Player 1.0.4 addresses the following security issues:

* Virtual machines can be put in various states of suspension, as specified by the ACPI power management standard. When returning from a sleep state (S2) to the run state (S0), the virtual machine process (VMX) collects information about the last recorded running state for the virtual machine. Under some circumstances, VMX read state information from an incorrect memory location. This issue could be used to complete a successful Denial-of-Service attack where the virtual machine would need to be rebooted.
Thanks to Tavis Ormandy of Google for identifying this issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE- 2007-1337 to this issue.
* Some VMware products support storing configuration information in VMware system files. Under some circumstances, a malicious user could instruct the virtual machine process (VMX) to store malformed data, causing an error. This error could enable a successful Denial-of-Service attack on guest operating systems.
Thanks to Sungard Ixsecurity for identifying this issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2007-1877 to this issue.
* Some VMware products managed memory in a way that failed to gracefully handle some general protection faults (GPFs) in Windows guest operating systems. A malicious user could use this vulnerability to crash Windows virtual machines. While this vulnerability could allow an attacker to crash a virtual machine, we do not believe it was possible to escalate privileges or escape virtual containment.
Thanks to Ruben Santamarta of Reversemode for identifying this issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2007-1069 to this issue.
* In a 64-bit Windows guest on a 64-bit host, debugging local programs could create system instability. Using a debugger to step into a syscall instruction may corrupt the virtual machine's register context. This corruption produces unpredictable results including corrupted stack pointers, kernel bugchecks, or vmware-vmx process failures. (bug 152159)
Thanks to Ken Johnson for identifying this issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2007-1876 to this issue.

In addition, VMware Player 1.0.4 fixes the following problem:

* A problem with VMware Tools caused the guest to run out of memory.

blog comments powered by Disqus