VMware Server

最新版本 VMware Server 1.0.7 Build 108231

VMware Server 1.0.7 Build 108231

VMware Server 1.0.7 Build 108231
VMware 的&章; 服務器是一個免費的工具,它使最終用戶能夠創建虛擬機,特別關注使用戶能夠通過遠程連接訪問這些服務器。如果您想要在一台計算機上同時運行一個或多個操作系統,那麼這非常方便,而且使用非常簡化的一組工具即可,即使非專業人員或具有多年技術的用戶也可輕鬆操作體驗虛擬機操作。儘管 VMware Server 並沒有提供大量可以在其他現代專業軟件包中找到的工具,但這裡提供的免費使用足以讓任何人輕鬆地創建,編輯,播放,複製和恢復到以前的版本每個單獨的虛擬機的快照輕鬆。這一切都可以通過使用非常簡單的用戶界面來實現,該用戶界面專門製作成直觀且組織良好的,具有足夠的信息以使所有用戶能夠管理其 VMware 會話的各個方面.

VMware Server 的第一個版本於 2006 年 7 月上市替代已停產的 VMware GSX 服務器,開發新功能,直到 2010 年 1 月 VMware Server 的支持和開發被關閉。然而,即使這個應用程序不再受開發者的支持,全世界的許多用戶仍然在使用它,主要是運行 Linux 操作系統的虛擬機。它的一些主要功能是:
可以安裝在虛擬機上的操作系統是 Windows,Linux,Solaris 和 Netware Portable– 虛擬機可以移動到第二台計算機而不會丟失配置支持傳統虛擬機支持虛擬硬件設備,如 CD-ROM,DVD-ROM,軟盤驅動器,並行端口等。注意:VMware 已經在 6 月 30 日放棄了對 VMware Server 的支持用戶仍然可以使用它,但建議切換到 VMware Workstation 和 VMware Player.



ScreenShot

軟體資訊
檔案版本 VMware Server 1.0.7 Build 108231

檔案名稱 VMware-server-installer-1.0.7-108231.exe
檔案大小 146.95 MB
系統 Windows 2000 / XP / Vista / Windows 7 / XP64 / Vista64 / Windows 7 64
軟體類型 免費軟體
作者 VMware Inc
官網 http://www.vmware.com/products/vcenter-server/
更新日期 2008-08-29
更新日誌

What's new in this version:

Server 1.0.7 addresses the following security issues:

Security Fix for VMware ISAPI Extension:
- Internet Server Application Programming Interface (ISAPI) is an API that extends the functionality of Internet Information Server (IIS). VMware uses ISAPI extensions in its Server product.
- One of the ISAPI extensions provided by VMware is vulnerable to a remote denial of service. By sending a malformed request, IIS might shut down. IIS 6.0 restarts automatically. However, IIS 5.0 does not restart automatically when its Startup Type is set to Manual.
- The Common Vulnerabilities and Exposures has assigned the name CVE-2008-3697 to this issue.

Setting ActiveX killbit:
- From this release, VMware has set the killbit on its ActiveX controls. Setting the killbit ensures that ActiveX controls cannot run in Internet Explorer (IE), and avoids security issues involving ActiveX controls in IE. See the KB article 240797 from Microsoft and the related references on this topic.
- Security vulnerabilities have been reported for ActiveX controls provided by VMware when run in IE. Under specific circumstances, exploitation of these ActiveX controls might result in denial-of-service or can allow running of arbitrary code when the user browses a malicious Web site or opens a malicious file in IE browser. An attempt to run unsafe ActiveX controls in IE might result in pop-up windows warning the user.
- Note: IE can be configured to run unsafe ActiveX controls without prompting. VMware recommends that you retain the default settings in IE, which prompts when unsafe actions are requested.
- Earlier, VMware had issued knowledge base articles, KB 5965318 and KB 9078920 on security issues with ActiveX controls.
- To avoid malicious scripts that exploit ActiveX controls, do not enable unsafe ActiveX objects in your browser settings. As a best practice, do not browse untrusted Web sites as an administrator and do not click OK or Yes if prompted by IE to allow certain actions.
- The Common Vulnerabilities and Exposures has assigned the names CVE-2008-3691, CVE-2008-3692, CVE-2008-3693, CVE-2008-3695, CVE-2007-5438, and CVE-2008-3696 to the security issues with VMware ActiveX controls.

Security Fix for Local Privilege Escalation on Host System:
- This release fixes a privilege escalation vulnerability in host operating systems. Exploitation of this vulnerability allows users to run arbitrary code on the host system with elevated privileges.
- The Common Vulnerabilities and Exposures has assigned the name CVE-2008-3698 to this issue.

Update to Freetype:
- FreeType 2.3.6 resolves an integer overflow vulnerability and other vulnerabilities that can allow malicious users to run arbitrary code or might cause a denial-of-service after reading a maliciously crafted file. This release updates FreeType to its latest version 2.3.7.
- The Common Vulnerabilities and Exposures has assigned the names CVE-2008-1806, CVE-2008-1807, and CVE-2008-1808 to the issues resolved in Freetype 2.3.6.

VMware Server 1.0.7 Build 108231 相關參考資料
CVE-2008-3695 - NVD

Unspecified vulnerability in a certain ActiveX control in VMware Workstation 5.5.x before 5.5.8 build 108000, VMware Workstation 6.0.x before 6.0.5 build 109488 ...

https://nvd.nist.gov

CVE-2008-3697 Detail - NVD

2008年9月3日 — An unspecified ISAPI extension in VMware Server before 1.0.7 build 108231 allows remote attackers to cause a denial of service (IIS crash) via a ...

https://nvd.nist.gov

Guest VM not starting

Guest VM not starting. I have a host system running windows XP Pro, SP3, and I ... I am using VMware Server Console, Version 1.0.7 build-108231. The Windows ...

https://communities.vmware.com

SID 1:14390

... 1.0.7 build 108880, VMware ACE 2.x before 2.0.5 build 109488, and VMware Server before 1.0.7 build 108231 has unknown impact and remote attack vectors, a ...

https://www.snort.org

SID 1:14547

... 1.0.7 build 108880, VMware ACE 2.x before 2.0.5 build 109488, and VMware Server before 1.0.7 build 108231 has unknown impact and remote attack vectors, a ...

https://www.snort.org

VMSA-2008-0014.3 | FR

VMware Product Server. Product Version 1.x. Running on Windows. Replace with/ Apply Patch 1.0.7 build 108231 or later. VMware Product Server. Product Version 1.

https://www.vmware.com

Vmware CVE

Unspecified vulnerability in a certain ActiveX control in VMware Workstation 5.5.x before 5.5.8 build 108000, VMware Workstation 6.0.x before 6.0.5 build 109488 ...

https://www.opencve.io

VMware Server ISAPI Extension Remote Denial Of Service

DESCRIPTION. An unspecified ISAPI extension in VMware Server before 1.0.7 build 108231 allows remote attackers to cause a denial of service (IIS crash) via a ...

https://www.trendmicro.com

VMware Virtual 8086 - Linux Local Ring0

2009年10月27日 — ... 1.0.7 build 108231 VMWare Server 1.0.7 VMWare Server 1.0.6 build ... Server 3.5 ESX350-200910401 VMWare ACE 2.5.3 Build 185404 Exploit-DB ...

https://www.exploit-db.com

Web Attack: VMware Directory Traversal CVE-2009-3733

A remote attacker could exploit the vulnerability using directory-traversal characters ('../') to access arbitrary files that contain sensitive information that ...

https://www.broadcom.com