1. downloads
  2. business software
  3. news
  4. reviews
  5. top apps
ダウンロードする VMware Player 1.0.4

VMware Player 1.0.4

VMware Inc  (フリーウェア)
ユーザーによる評価
広告

バーチャルマシンとは、ソフトウェア内で定義されるコンピュータです。お使いのPC内で、他のPCを動作させるようなイメージです

このフリーのデスクトップ仮想化アプリケーションは、その他Microsoft Virtual ServerバーチャルマシンまたはMicrosoft Virtual PCバーチャルマシン同様、VMware Workstation、VMware Fusion、VMware ServerまたはVMware ESXによって作成された全てのバーチャルマシンの操作性を高めます。

  • 単一のPC上で、同時に複数のOSを起動。
  • インストールや設定の手間の要らない、プレコンフィグ製品の恩恵を体験
  • ホストコンピュータとバーチャルマシン間でデータを共有
  • 32ビットおよび64ビットのバーチャルマシンを稼動
  • 2-way Virtual SMP機能を利用
  • サードパーティー製のバーチャルマシンおよびイメージを使用
  • 幅広いホストおよびゲストOSに対応
  • USB 2.0デバイス対応
  • スタートアップ時に機器の情報を取得
  • 直感的なホームページ型のインターフェースを通して、バーチャルマシンに容易にアクセス
タイトル: VMware Player 1.0.4
ファイル名: VMware-player-1.0.4-44386.exe
ファイルサイズ: 28.67MB (30,064,768 バイト)
動作環境: Windows 2000 / XP / XP 64-bit / Windows 10 / Windows 10 64-bit
言語: 多言語
ライセンス: フリーウェア
追加日: 2007年04月27日
作者: VMware Inc
www.vmware.com
MD5チェックサム: 1E0014E6BA6CCF0C93769EA8424010E1

VMware Player 1.0.4 addresses the following security issues:

* Virtual machines can be put in various states of suspension, as specified by the ACPI power management standard. When returning from a sleep state (S2) to the run state (S0), the virtual machine process (VMX) collects information about the last recorded running state for the virtual machine. Under some circumstances, VMX read state information from an incorrect memory location. This issue could be used to complete a successful Denial-of-Service attack where the virtual machine would need to be rebooted.
Thanks to Tavis Ormandy of Google for identifying this issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE- 2007-1337 to this issue.
* Some VMware products support storing configuration information in VMware system files. Under some circumstances, a malicious user could instruct the virtual machine process (VMX) to store malformed data, causing an error. This error could enable a successful Denial-of-Service attack on guest operating systems.
Thanks to Sungard Ixsecurity for identifying this issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2007-1877 to this issue.
* Some VMware products managed memory in a way that failed to gracefully handle some general protection faults (GPFs) in Windows guest operating systems. A malicious user could use this vulnerability to crash Windows virtual machines. While this vulnerability could allow an attacker to crash a virtual machine, we do not believe it was possible to escalate privileges or escape virtual containment.
Thanks to Ruben Santamarta of Reversemode for identifying this issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2007-1069 to this issue.
* In a 64-bit Windows guest on a 64-bit host, debugging local programs could create system instability. Using a debugger to step into a syscall instruction may corrupt the virtual machine's register context. This corruption produces unpredictable results including corrupted stack pointers, kernel bugchecks, or vmware-vmx process failures. (bug 152159)
Thanks to Ken Johnson for identifying this issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2007-1876 to this issue.

In addition, VMware Player 1.0.4 fixes the following problem:

* A problem with VMware Tools caused the guest to run out of memory.

blog comments powered by Disqus