A virtual machine is a computer defined in software. It''s like running a PC on your PC.
This free desktop virtualization software application makes it easy to operate any virtual machine created by VMware Workstation, VMware Fusion, VMware Server or VMware ESX.
Key Features Include:
- Run multiple operating systems simultaneously on a single PC.
- Experience the benefits of preconfigured products without any installation or configuration issues.
- Share data between host computer and virtual machine.
- Run both 32 and 64 bit virtual machines.
- Leverage 2-way Virtual SMP.
- Use 3rd-party virtual machines and images.
- Share data between host computer and virtual machine.
- Broad host and guest operating system support.
- Support for USB 2.0 devices.
- Get appliance info at start-up.
- Gain easy access to virtual machines via intuitive home page interface.
VMware Player also supports Microsoft Virtual Server virtual machines or Microsoft Virtual PC virtual machines.
軟體資訊 |
檔案版本 |
VMware Player 1.0.4 |
檔案名稱 |
VMware-player-1.0.4-44386.exe
|
檔案大小 |
28.67MB |
系統 |
Windows 2000 / XP / Windows 7 / XP 64-bit / Vista 64-bit / Windows 7 64-bit / Windows 8 / Windows 8 64-bit / Windows 10 / Windows 10 64-bit |
支援語系 |
Multiple languages |
軟體類型 |
免費軟體 |
更新日期 |
2007-04-27 |
更新日誌 |
VMware Player 1.0.4 addresses the following security issues:
* Virtual machines can be put in various states of suspension, as specified by the ACPI power management standard. When returning from a sleep state (S2) to the run state (S0), the virtual machine process (VMX) collects information about the last recorded running state for the virtual machine. Under some circumstances, VMX read state information from an incorrect memory location. This issue could be used to complete a successful Denial-of-Service attack where the virtual machine would need to be rebooted. Thanks to Tavis Ormandy of Google for identifying this issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE- 2007-1337 to this issue. * Some VMware products support storing configuration information in VMware system files. Under some circumstances, a malicious user could instruct the virtual machine process (VMX) to store malformed data, causing an error. This error could enable a successful Denial-of-Service attack on guest operating systems. Thanks to Sungard Ixsecurity for identifying this issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2007-1877 to this issue. * Some VMware products managed memory in a way that failed to gracefully handle some general protection faults (GPFs) in Windows guest operating systems. A malicious user could use this vulnerability to crash Windows virtual machines. While this vulnerability could allow an attacker to crash a virtual machine, we do not believe it was possible to escalate privileges or escape virtual containment. Thanks to Ruben Santamarta of Reversemode for identifying this issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2007-1069 to this issue. * In a 64-bit Windows guest on a 64-bit host, debugging local programs could create system instability. Using a debugger to step into a syscall instruction may corrupt the virtual machine's register context. This corruption produces unpredictable results including corrupted stack pointers, kernel bugchecks, or vmware-vmx process failures. (bug 152159) Thanks to Ken Johnson for identifying this issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2007-1876 to this issue.
In addition, VMware Player 1.0.4 fixes the following problem:
* A problem with VMware Tools caused the guest to run out of memory.
|
作者 |
VMware Inc |
官網 |
http://www.vmware.com/products/player/ |