VMware heeft de vierde update voor versie 8.0 van zijn virtualisatiesoftware Workstation uitgebracht. Met dit programma is het mogelijk om een of meer virtuele computers aan te maken, waarop een groot aantal verschillende besturingssystemen kan worden geïnstalleerd. Op die manier kunnen ze naast elkaar worden gebruikt, in tegenstelling tot een dualbootopstelling, waarbij uit de een of de ander moet worden gekozen. VMware Workstation is beschikbaar voor Windows en Linux, en een licentie kost ongeveer 155 euro. Meer informatie over de mogelijkheden van dit pakket kunnen op deze pagina worden gevonden. Versie 8.0.4 bevat diverse bugfixes en beveiligingsupdates, de belangrijkste zijn hieronder op een rijtje gezet.
General IssuesSecurity Issues
- Linux guests running the Linux kernel version 2.6.34 or later could not be pinged from the host via an IPv6 address.
- On rare occasions, Linux guests would suddenly fail to Autofit or enter Unity.
- Unity mode would exit if the title bar of an application contained certain non UTF-8 encoded extended ASCII characters.
- On Windows hosts, the VMware Workstation user interface sometimes became unresponsive when minimized from full-screen mode if the suggestion balloon was being displayed.
- On Windows hosts, the user interface sometimes became unresponsive if the application was rendered on an extended display that was abruptly disconnected.
VMware Security Advisory VMSA-2012-0011 documents workarounds and mitigation for these resolved issues.
- VMware host Checkpoint file memory corruption
Input data was not properly validated when loading Checkpoint files. This issue could have allowed an attacker with the ability to load a specially crafted Checkpoint file to execute arbitrary code on the host.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-3288 to this issue.- VMware virtual machine remote device denial of service
A device (such as CD-ROM or keyboard) that is available to a virtual machine while physically connected to a system that does not run the virtual machine is referred to as a remote device. Traffic coming from remote virtual devices was incorrectly handled. This issue could have allowed an attacker who was capable of manipulating the traffic from a remote virtual device to crash the virtual machine.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-3289 to this issue.
:fill(white)/i/1316076567.jpeg?f=thumb)
:fill(white)/i/1316076568.jpeg?f=thumb)
:fill(white)/i/1316076569.jpeg?f=thumb)