1. downloads
  2. business software
  3. news
  4. reviews
  5. top apps
Pobierz VMware Server 2.0.1

VMware Server 2.0.1

Od VMware Inc  (Freeware)
Ocena Użytkowników
Reklama
VMware® Server to darmowy produkt z dziedziny wirtualizacji systemów dla serwerów Windows i Linux z pomocą techniczną na poziomie komercyjnym. Umożliwia firmom dzielenie fizycznych serwerów na wiele wirtualnych komputerów i korzystać z zalet wirtualizacji. VMware Server to solidny i prosty w użyciu produkt dla osób nie znających technologii wirtualizacji serwerów. Program jest oparty na sprawdzonej technologii firmy VMware.
  • Utwórz nowe serwery w ciągu kilku minut bez inwestycji w nowy sprzęt
  • Korzystaj z programów i systemów Windows, Linux, Solaris i Netware na tym samym serwerze
  • Zwiększ wykorzystanie procesora na fizycznym serwerze
  • Przenieś wirtualne komputery z jednego fizycznego serwera na drugi bez ponownej konfiguracji
  • Zapisz cały stan wirtualnego komputera i przywróć ten stan jednym kliknięciem
  • Używając VMware VirtualCenter uzyskuje się możliwość centralnego zarządzania w celu wydajnej instalacji, monitorowania i zarządzania infrastrukturą serwerów
  • Dostęp do pomocy technicznej na poziomie komercyjnym
  • Łatwa migracja wirtualnych komputerów na infrastrukturę VMware
Tytuł: VMware Server 2.0.1
Nazwa pliku: VMware-server-2.0.1-156745.exe
Rozmiar: 507.50MB (532,150,008 bajtów)
Wymagania: Windows 2000 / XP / Vista / Windows 7 / XP 64-bit / Vista 64-bit / Windows 7 64-bit / Windows 8 / Windows 8 64-bit / Windows 10 / Windows 10 64-bit
Języki: Wielojęzykowy
Licencja: Freeware
Data dodania: 3 kwietnia 2009
Autor: VMware Inc
www.vmware.com
Suma kontrolna MD5: D0EEFAA79E42D13A693C4D732A460BA4


Security Fixes

* New: Host code execution vulnerability from a guest operating system
A critical vulnerability in the virtual machine display function might
allow a guest operating system to run code on the host. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CVE-2009-1244 to this issue.
* VMnc codec heap overflow vulnerabilities
The VMnc codec assists in record and replay of sessions which are records
of the dynamic virtual machine state over a period of time. Two heap
overflow vulnerabilities might allow a remote attacker to execute
arbitrary code on VMware hosted products. For an attack to be successful,
the user must visit a malicious Web page or open a malicious video file.
The Common Vulnerabilities and Exposures project has assigned the names
CVE-2009-0909 and CVE-2009-0910 to these issues.
* A VMCI privilege escalation on Windows-based hosts or Windows-based guests
The Virtual Machine Communication Interface (VMCI) provides fast and
efficient communication between two or more virtual machines on the same
host and between a virtual machine and the host operating system. A
vulnerability in vmci.sys might allow privilege escalation on
Windows-based machines. This might occur on Windows-based hosts or inside
Windows-based guest operating systems. Current versions of ESX Server do
not support the VMCI interface and hence they are not affected by this
vulnerability. To correct this vulnerability on Windows-based hosts, see
Virtual Machine Communication Interface (VMCI) privilege escalation on
Windows-based Workstation, Player, ACE and Server (KB 1009826).
The Common Vulnerabilities and Exposures project has assigned the name
CVE-2009-1147 to this issue.
* A remote denial-of-service vulnerability in authd for Windows-based hosts
A vulnerability in vmware-authd.exe might cause a denial-of-service
condition on Windows hosts. The Common Vulnerabilities and Exposures
project has assigned the name CVE-2009-0177 to this issue.
* Updated vm-support script
This release improves data collection when the vm-support script is run by
the Server administrator on request of VMware support or its support
partners. The file that contains the SSL keys for communication between
Server and vCenter and other applications is no longer collected. For more
details, see the KB article Data Security Best Practices - SSL keys for
communicating with VirtualCenter and other applications (KB 1008166).
* Windows-based host privilege escalation in hcmon.sys
A vulnerability in an I/O Control (ioctl) function in hcmon.sys might be
used to escalate privileges on a Windows-based host. The Common
Vulnerabilities and Exposures project has assigned the name CVE-2009-1146
to this issue.
New releases of hosted products address a denial-of-service problem
described in CVE-2008-3761, which can only be exploited by a privileged
Windows account.
* Denial-of -service vulnerability in a virtual device
A vulnerability in a guest virtual device driver might allow a guest
operating system to cause the host and consequently any virtual machine on
that host to fail. The Common Vulnerabilities and Exposures project has
assigned the name CVE-2008-4916 to this issue.

Miscellaneous

* Mount installer option mounts current CD-ROM image instead of VMware Tools
installer image
If a CD-ROM image is mounted to a virtual machine with VMware Tools
installed, the Mount installer option in the Web UI incorrectly mounts the
CD-ROM image instead of the VMware Tools image. The issue is resolved in
this release.
* Unable to install the latest version of VIX API on Server 2.0.x
You cannot install VMware VIX API 1.6.2 of due to an issue with the MSI
installer for VIX API. This issue is resolved in this release.
* The default VI Web Access HTTP connection port is 8222 and the default
HTTPS port is 8333. If you use these defaults, or any values other than 80
(HTTP) and 443 (HTTPS), you must specify the port number when you connect to
VMware Server using VI Web Access. You must also allow connection to these
ports through your firewall.
An example URL to connect to VI Web Access is http://server_host:8222
If you want to use ports 80 (HTTP) and 443 (HTTPS), override the default
values during installation.
Note: If you are running IIS or Apache web server on the default ports,
specify alternate HTTP and HTTP ports when prompted by the Windows
installer or vmware-config.pl. Alternatively, stop IIS's default Web site
or any other Web site running on these ports. On Linux, shut down Apache
or any other application using these ports and make sure they are not
configured to restart automatically.
This issue is resolved in this release.

blog comments powered by Disqus