VMware Server

最新版本 VMware Server 1.0.4 Build 56528

VMware Server 1.0.4 Build 56528

VMware Server 1.0.4 Build 56528
VMware 的&章; 服務器是一個免費的工具,它使最終用戶能夠創建虛擬機,特別關注使用戶能夠通過遠程連接訪問這些服務器。如果您想要在一台計算機上同時運行一個或多個操作系統,那麼這非常方便,而且使用非常簡化的一組工具即可,即使非專業人員或具有多年技術的用戶也可輕鬆操作體驗虛擬機操作。儘管 VMware Server 並沒有提供大量可以在其他現代專業軟件包中找到的工具,但這裡提供的免費使用足以讓任何人輕鬆地創建,編輯,播放,複製和恢復到以前的版本每個單獨的虛擬機的快照輕鬆。這一切都可以通過使用非常簡單的用戶界面來實現,該用戶界面專門製作成直觀且組織良好的,具有足夠的信息以使所有用戶能夠管理其 VMware 會話的各個方面.

VMware Server 的第一個版本於 2006 年 7 月上市替代已停產的 VMware GSX 服務器,開發新功能,直到 2010 年 1 月 VMware Server 的支持和開發被關閉。然而,即使這個應用程序不再受開發者的支持,全世界的許多用戶仍然在使用它,主要是運行 Linux 操作系統的虛擬機。它的一些主要功能是:
可以安裝在虛擬機上的操作系統是 Windows,Linux,Solaris 和 Netware Portable– 虛擬機可以移動到第二台計算機而不會丟失配置支持傳統虛擬機支持虛擬硬件設備,如 CD-ROM,DVD-ROM,軟盤驅動器,並行端口等。注意:VMware 已經在 6 月 30 日放棄了對 VMware Server 的支持用戶仍然可以使用它,但建議切換到 VMware Workstation 和 VMware Player.



ScreenShot

軟體資訊
檔案版本 VMware Server 1.0.4 Build 56528

檔案名稱 VMware-server-installer-1.0.4-56528.exe
檔案大小 146.37 MB
系統 Windows 2000 / XP / Vista / Windows 7 / XP64 / Vista64 / Windows 7 64
軟體類型 免費軟體
作者 VMware Inc
官網 http://www.vmware.com/products/vcenter-server/
更新日期 2007-09-29
更新日誌

What's new in this version:

Issues Resolved in VMware Server 1.0.4
- In previous releases, when a virtual machine configuration (.vmx) file contained the line serialX.HardwareFlowControl = TRUE, the modem control signals were not correctly handled. This release fixes that problem. Modem control signals are now strictly passed through between the virtual and the physical serial port.
- This release fixes a problem that caused Fedora Core 7 to fail with an ASSERT when issuing SCSI commands that have illegal targets. This problem is not clearly exploitable by a normal user.
- This release fixes a problem that could cause Linux virtual machines with VMI-enabled kernels to run very slowly after being rebooted repeatedly.
- This release fixes a problem that could cause a virtual machine to fail at power-on when using a sound card with more than two mixer channels on a Windows 32-bit host.
- This release fixes a problem that could cause a 64-bit Solaris 10 virtual machine to fail at power-on after being updated with Solaris Update Patch 125038-04.
- This release fixes a problem that resulted from a conflict between Linux guest operating systems with kernel version 2.6.21 and RTC-related processes on the host. This problem caused the virtual machine to quit unexpectedly.
- This release fixes a problem that caused the hostd to quit unexpectedly in virtual machines with a corrupted snapshot.
- This release fixes a problem that prevented virtual machines running Fedora Core 7 from properly recognizing LSILogic SCSI devices.
- This release fixes a problem that prevented the VMware vmmon module from building correctly on hosts running Linux with kernel version 2.6.20-rc1.
- This release fixes a problem that prevented the VMware vmnet module from building correctly on hosts running Linux with kernel versions higher than 2.6.21.
- This release fixes a problem that could corrupt the guest's memory on hosts running Linux with kernel versions higher than 2.6.21.
- This release fixes the following problem: when a user attempts to access a virtual machine through the Windows remote VMware Service Console, and the user does not have execute permission on the virtual machine configuration (.vmx) file, the display is blank with no indication of the actual problem. This release adds an error message in this circumstance, to advise the user that execute access is required to connect to the virtual machine with the VMware Service Console.
- This release fixes a problem with virtual machines running Red Hat Linux 7.1, kernel version 2.4.2, that caused the guest operating system to become unresponsive during the installation of VMware Tools, after the user selected the default display size.
- This release fixes a problem that prevented VMware Player from launching. This problem was accompanied by the error message VMware Player unrecoverable error: (player) Exception 0xc0000005 (access violation) has occurred. This problem could result in a security vulnerability from some images stored in virtual machines downloaded by the user.

Security Issues Resolved in VMware Server 1.0.4:
- This release fixes a security vulnerability that could allow a guest operating system user with administrative privileges to cause memory corruption in a host process, and thus potentially execute arbitrary code on the host. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the following name to this issue: CVE-2007-4496.
- This release fixes a security vulnerability that could allow a guest operating system user without administrator privileges to cause a host process to become unresponsive or exit unexpectedly, making the guest operating system unusable. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the following name to this issue: CVE-2007-4497.
- This release fixes several security vulnerabilities in the VMware DHCP server that could enable a malicious web page to gain system-level privileges.
- This release fixes a security vulnerability that could allow a malicious remote user to exploit the library file IntraProcessLogging.dll to overwrite files in a system.
- This release fixes a security vulnerability that could allow a malicious remote user to exploit the library file vielib.dll to overwrite files in a system.
- This release fixes a security vulnerability in which VMware Server was starting registered Windows services such as the Authorization service with "bare" (unquoted) paths, such as c:program filesvmware.... Applications and services in Windows must be started with a quoted path. This vulnerability could allow a malicious user to escalate user privileges.
- This release fixes a problem that could cause user passwords to be printed in cleartext in some VMware Server logs.

VMware Server 1.0.4 Build 56528 相關參考資料
CVE-2007-5024 - NVD

2007年9月21日 — EMC VMware Server before 1.0.4 Build 56528 writes passwords in cleartext to unspecified log files, which allows local users to obtain ...

https://nvd.nist.gov

Debian GNULinux 4.0 - VMware Server インストール

The configuration of VMware Server 1.0.4 build-56528 for Linux for this running kernel completed successfully. Debian GNU/Linux 4.0 : VMware Server.

https://www.server-world.info

How To Install VMware Server + MUI 1.0.4 On Ubuntu 7.04

Installing VMware Server: Untar the VMware Server package: tar -xvzf VMware-server-1.0.4-56528.tar.gz. Change into the install directory: cd vmware-server- ...

https://www.howtoforge.com

How to: Upgrade VMWARE Server under Linux

2007年9月25日 — Build 56528 is a release build of VMware Server 1.0.4. It is a maintenance bug fix release to address security issues.

https://www.cyberciti.biz

Kernel OOPS during install

i'm trying to install CentOS 5.3 on a VMWare virtual machine running VMWareServe 1.0.4 build-56528. I have 8 virtual machines that are running some older ...

https://forums.centos.org

Problems installing Solaris 10 guest on 64-bit RHEL 5 host

I am trying to load Solaris 10 onto my VMware server (1.0.4-build 56528). The host OS is RedHat EL 5 ES and is updated with all patches. The Server.

https://communities.vmware.com

Solved: Fedora 8's new kernel 2.6.24 - Broadcom Community

Building the vmnet module. Building for VMware Server 1.0.0. Using 2.6.x kernel build system. make: Entering directory `/tmp/vmware-config0/vmnet-only'.

https://communities.vmware.com

VMSA-2007-0006:Updated versions of all supported hosted ...

2007年9月16日 — VMware Server prior to 1.0.4 VMware ACE ... VMware Server 1.0.3 upgrade to version 1.0.4 (Build# 56528) ... Server 1.0.4 ------------ www.vmware ...

https://support.broadcom.com

Vmware Server version 1.0.4 : Security vulnerabilities, CVEs

Directory traversal vulnerability in VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX ...

https://www.cvedetails.com

Vulnerability Details : CVE-2007-5024 - Vmware Server

2007年9月21日 — CVE-2007-5024 : EMC VMware Server before 1.0.4 Build 56528 writes passwords in cleartext to unspecified log files, which allows local users ...

https://www.cvedetails.com