VMware

VMware Player 1.0 Release Notes

Features | Documentation | Knowledge Base | Discussion Forums | Downloads

Release Date: November 06, 2008
Build Number: 126128

VMware Player is a free desktop application that lets you run a virtual machine on a Microsoft Windows or Linux PC.
The Player provides an intuitive user interface for running preconfigured virtual machines created with VMware Workstation, VMware Server, and ESX Server. On Microsoft Windows hosts, Player also opens and runs Microsoft Virtual PC and Virtual Server virtual machines and Symantec Backup Exec System Recovery system images.

The document contains new features, limitations, caveats, security fixes, and general release information about the Player.
This document covers the following topics:

What's New in VMware Player in 1.0.x

This section lists all maintenance releases of VMware Player 1.0.x.

What's New in Player 1.0.3

Player 1.0.3 provides enhanced support for the following Host Operating Systems:

  • Red Hat Enterprise Linux 4.0, Update 4 (AS, ES, WS), 32-bit and 64-bit
  • Red Hat Enterprise Linux 3.0, Update 8 (AS, ES, WS), 32-bit and 64-bit
  • Experimental support for Red Hat Enterprise Linux 5.0, 32-bit and 64-bit
  • Mandriva Corporate Server 4, 32-bit and 64-bit
  • Experimental support for Mandriva Linux 2007, 32-bit and 64-bit
  • Experimental support for Ubuntu Linux 6.10, 32-bit and 64-bit

This version of Player 1.0.3 also provides support for Guest Operating Systems:

  • Red Hat Enterprise Linux 4.0, Update 4 (AS, ES, WS), 32-bit and 64-bit
  • Red Hat Enterprise Linux 3.0, Update 8 (AS, ES, WS), 32-bit and 64-bit
  • Experimental support for Red Hat Enterprise Linux 5.0, 32-bit and 64-bit
  • Experimental enhanced support for Microsoft Windows Vista, 32-bit and 64-bit
  • Mandriva Corporate Server 4, 32-bit and 64-bit
  • Experimental support for Mandriva Linux 2007, 32-bit and 64-bit
  • Experimental support for Solaris x86 10 6/06 (Update 2), 32-bit and 64-bit
  • Experimental support for Ubuntu Linux 6.10, 32-bit and 64-bit

What's New in Player 1.0.2

Player 1.0.2 provides enhanced support for the following Host Operating Systems:

  • Windows Server 2003 R2, 32-bit, 64-bit
  • Mandriva Linux 2006, 32-bit, 64-bit
  • SUSE Linux Enterprise Server 10, 32-bit, 64-bit
  • SUSE Linux Enterprise Server 9 SP3, 32-bit, 64-bit
  • SUSE Linux 10.1, 32-bit, 64-bit
  • Red Hat Enterprise Linux 3.0 update 7, 32-bit, 64-bit
  • Experimental support for Red Hat Enterprise Linux 3.0 Update 8, 32-bit, 64-bit
  • Red Hat Enterprise Linux 4.0 Update 3, 32-bit, 64-bit
  • Experimental support for Red Hat Enterprise Linux 4.0 Update 4, 32-bit, 64-bit
  • Ubuntu Linux 6.06, 32-bit, 64-bit
  • Ubuntu Linux 5.10, 32-bit, 64-bit
  • Ubuntu Linux 5.04, 32-bit, 64-bit

This version of Player 1.0.2 also supports the following Guest Operating Systems:

  • Windows Server 2003 R2, 32-bit, 64-bit
  • Mandriva Linux 2006, 32-bit, 64-bit
  • SUSE Linux Enterprise Server 10, 32-bit, 64-bit
  • SUSE Linux Enterprise Server 9 SP3, 32-bit, 64-bit
  • SUSE Linux 10.1, 32-bit, 64-bit
  • Red Hat Enterprise Linux 3.0 update 7, 32-bit, 64-bit
  • Experimental support for Red Hat Enterprise Linux 3.0 Update 8, 32-bit, 64-bit
  • Red Hat Enterprise Linux 4.0 Update 3, 32-bit, 64-bit
  • Experimental support for Red Hat Enterprise Linux 4.0 Update 4, 32-bit, 64-bit
  • Novell Netware 6.5 SP3, 32-bit
  • Experimental support for FreeBSD 6.1, 32-bit, 64-bit
  • Experimental support for FreeBSD 6.0, 32-bit, 64-bit
  • Experimental support for Solaris x86 10, 10 Update 1, 32-bit, 64-bit
  • Ubuntu Linux 6.06, 32-bit, 64-bit
  • Ubuntu Linux 5.10, 32-bit, 64-bit
  • Ubuntu Linux 5.04, 32-bit, 64-bit

Change in End User License Agreement (EULA) Display

VMware Player no longer displays the End User License Agreement (EULA) at installation. The EULA is now displayed when you launch VMware Player.

What's New in Player 1.0

Player 1.0 provides the following features:

Work and Play In a Virtual World with VMware Player

VMware Player is a free desktop application that lets you run a virtual machine on a Windows or Linux PC.
VMware Player provides an intuitive user interface for running preconfigured virtual machines created with VMware Workstation, GSX Server, and ESX Server. On Windows hosts, VMware Player also opens and runs Microsoft Virtual PC and Virtual Server virtual machines and Symantec LiveState Recovery system images. VMware Player includes features that let you configure virtual machines for optimal performance and take advantage of host machine devices. VMware Player enables you to share your virtual machines with colleagues, partners, customers, and clients who might not own VMware products. Simply by downloading VMware Player, anyone can open and run compatible virtual machines.

Download VMware Player and Virtual Machines

You can download the Player and virtual machine to use with VMware Player at Virtual Appliance Marketplace.

For more information, refer the documentation for Player (VMware Player Manual).

Known Issues

  • On Windows hosts, if you use Workstation to shrink a virtual disk while VMware Player is running, after the shrink process completes, the display resolution for the guest running in the player incorrectly changes to the maximum available for the host video card and monitor.
    Workaround
    Reset the display resolution manually for the guest running in the player.
  • VMware Player does not support the configuration option that sets virtual machines to enter full screen mode after powering on.
    This option is set in the configuration (.vmx) file:
    gui.fullScreenAtPowerOn = "TRUE")
    If this option is set, (for example, because the virtual machine is used in Workstation with this setting), VMware Player enters full screen mode, but the menu and tool bar at the top of the window are not displayed.

Resolved Issues

This section describes the resolved issues in all maintenance releases of Player 1.0.x.

Fixed in 1.0.9 | Fixed in 1.0.8 | Fixed in 1.0.7 | Fixed in 1.0.6 | Fixed in 1.0.5 | Fixed in 1.0.4 | Fixed in 1.0.1

VMware Player 1.0.9

Player 1.0.9 addresses the following security issue:

VMware Addresses Privilege Escalation on Guest Systems Running 32-Bit or 64-Bit Operating Systems

VMware products emulate hardware functions and create the possibility to run guest operating systems.
A flaw in the CPU hardware emulation might allow the virtual CPU to incorrectly handle the trap flag. Exploitation of this flaw might lead to a privilege escalation on guest operating systems. An attacker needs a user account on the guest operating system and have the ability to run applications.
The Common Vulnerabilities and Exposures has assigned the name CVE-2008-4915 to this issue.

VMware Player 1.0.8

Player 1.0.8 addresses the following security issues:

Setting ActiveX killbit

Starting from this release, VMware has set the killbit on its ActiveX controls. Setting the killbit ensures that ActiveX controls cannot run in Internet Explorer (IE), and avoids security issues involving ActiveX controls in IE. See the KB 240797 from Microsoft and the related references on this topic.
Security vulnerabilities have been reported for ActiveX controls provided by VMware when run in IE. Under specific circumstances, exploitation of these ActiveX controls might result in denial-of-service or can allow running of arbitrary code when the user browses a malicious Web site or opens a malicious file in the IE browser. An attempt to run unsafe ActiveX controls in IE might result in pop-up windows warning the user.
Note: IE can be configured to run unsafe ActiveX controls without prompting. VMware recommends that you retain the default settings in IE, which prompts when unsafe actions are requested.
Earlier, VMware had issued knowledge base articles, KB 5965318 and KB 9078920 on security issues with ActiveX controls.
To avoid malicious scripts that exploit ActiveX controls, do not enable unsafe ActiveX objects in your browser settings. As a best practice, do not browse untrusted Web sites as an administrator and do not click OK or Yes if prompted by IE to allow certain actions.
The Common Vulnerabilities and Exposures has assigned the names CVE-2008-3691, CVE-2008-3692, CVE-2008-3693, CVE-2008-3694, CVE-2008-3695, CVE-2007-5438, and CVE-2008-3696 to the security issues with VMware ActiveX controls.

Update to FreeType

FreeType 2.3.6 resolves an integer overflow vulnerability and other vulnerabilities that can allow malicious users to run arbitrary code or might cause a denial-of-service after reading a maliciously crafted file. This release updates FreeType to its latest version 2.3.7.
The Common Vulnerabilities and Exposures has assigned the names CVE-2008-1806, CVE-2008-1807, and CVE-2008-1808 to the issues resolved in FreeType 2.3.6.

Security Fix for Local Privilege Escalation on Host System

This release fixes a privilege escalation vulnerability in the host operating system. Exploitation of this vulnerability allows users to run arbitrary code on the host system with elevated privileges.
The Common Vulnerabilities and Exposures project has assigned the name CVE-2008-3698 to this issue.

VMware Player 1.0.7

Player 1.0.7 resolves an issue where virtual machines fail unexpectedly after a Symantec virus definition update from version 213 to version 220.

VMware Player 1.0.6

Player 1.0.6 addresses the following security issues:

  • An internal security audit determined that a malicious user could attain the LocalSystem privileges. The user might make the authd process connect to a named pipe that is opened and controlled by the malicious user. In this situation, the malicious user could successfully impersonate authd and attain privileges under which authd is running.
  • This release updates the libpng library version to 1.2.22 to remove various security vulnerabilities.
  • A vulnerability in VMware Player running on Windows allowed complete access to the host's file system from a guest machine. This access included the ability to create and modify executable files in sensitive locations.
    (CORE-2007-0930)
  • A security vulnerability in OpenSSL 0.9.7j could make it possible to forge a RSA key signature. VMware Player 1.0.6 upgrades OpenSSL to version 0.9.7l to avoid this vulnerability.
    RSA Signature Forgery (CVE-2006-4339)
  • The authd process read and honored the vmx.fullpath variable in the user-writable file config.ini, creating a security vulnerability.
  • The config.ini file could be modified by non-administrator to change the VMX launch path. This created a vulnerability that could be exploited to escalate a user's privileges.

VMware Player 1.0.5

Player 1.0.5 addresses the following security issues:

  • This release fixes several security vulnerabilities in the VMware DHCP server that could enable a malicious Web page to gain system-level privileges.
    The Common Vulnerabilities and Exposures assigned the following names to these issues: CVE-2007-0061, CVE-2007-0062, and CVE-2007-0063.
    Thanks to Neel Mehta and Ryan Smith of the IBM Internet Security Systems X-Force for discovering and researching these vulnerabilities.
  • This release fixes a security vulnerability that could allow a guest operating system user with administrative privileges to cause memory corruption in a host process, and thus potentially run arbitrary code on the host. The Common Vulnerabilities and Exposures assigned the following name to this issue: CVE-2007-4496.
    Thanks to Rafal Wojtczvk of McAfee for identifying and reporting this issue.
  • This release fixes a security vulnerability that could allow a guest operating system user without administrator privileges to cause a host process to stop responding or exit unexpectedly, making the guest operating system unusable. The Common Vulnerabilities and Exposures assigned the following name to this issue: CVE-2007-4497.
    Thanks to Rafal Wojtczvk of McAfee for identifying and reporting this issue.
  • This release fixes a security vulnerability that could allow a malicious remote user to exploit the library file IntraProcessLogging.dll to overwrite files in a system.
    The Common Vulnerabilities and Exposures assigned the following name to this issue: CVE-2007-4059.
    Thanks to the Goodfellas Security Research Team for discovering and researching these vulnerabilities.
  • This release fixes a security vulnerability that could allow a malicious remote user to exploit the library file vielib.dll to overwrite files in a system.
    The Common Vulnerabilities and Exposures assigned the following names to this issue: CVE-2007-4155.
    Thanks to the Goodfellas Security Research Team for discovering and researching these vulnerabilities.
  • This release fixes an issue that prevented VMware Player from launching. This issue was accompanied by the error message VMware Player unrecoverable error: (player) Exception 0xc0000005 (access violation) has occurred. This issue could result in a security vulnerability from images stored in virtual machines downloaded by the user.
  • This release fixes a security vulnerability in which VMware Player was starting registered Windows services such as the Authorization service with bare (unquoted) paths, such as c:\program files\vmware\.... Applications and services in Windows must be started with a quoted path. This vulnerability could allow a malicious user to escalate user privileges.
    Thanks to Foundstone for discovering this vulnerability.

VMware Player 1.0.4

Player 1.0.4 addresses the following security issues:

  • Virtual machines can be put in various states of suspension, as specified by the ACPI power management standard. When returning from a sleep state (S2) to the run state (S0), the virtual machine process (VMX) collects information about the last recorded running state for the virtual machine. Under some circumstances, VMX read state information from an incorrect memory location. This issue could be used to cause a successful denial-of-service attack where the virtual machine must be rebooted.
    The Common Vulnerabilities and Exposures assigned the name CVE- 2007-1337 to this issue.
    Thanks to Tavis Ormandy of Google for identifying this issue.
  • Some VMware products support storing configuration information in VMware system files. Under some circumstances, a malicious user could instruct the virtual machine process (VMX) to store malformed data, causing an error. This error could enable a successful denial-of-service attack on guest operating systems.
    The Common Vulnerabilities and Exposures assigned the name CVE-2007-1877 to this issue.
    Thanks to Sungard Ixsecurity for identifying this issue.
  • Some VMware products managed memory in a way that failed to gracefully handle some general protection faults (GPF) in Windows guest operating systems. A malicious user might use this vulnerability to stop Windows virtual machines. While this vulnerability can allow an attacker to stop a virtual machine, it is possible to escalate privileges or escape virtual containment.
    The Common Vulnerabilities and Exposures assigned the name CVE-2007-1069 to this issue.
    Thanks to Ruben Santamarta of Reversemode for identifying this issue.
  • In a 64-bit Windows guest on a 64-bit host, debugging local programs could create system instability. Using a debugger to step into a syscall instruction might corrupt the virtual machine's register context. This corruption produces unpredictable results, including corrupted stack pointers, kernel bugchecks, or VMX process failures. (bug 152159)
    The Common Vulnerabilities and Exposures assigned the name CVE-2007-1876 to this issue.
    Thanks to Ken Johnson for identifying this issue.
In addition, Player 1.0.4 also resolves an issue with the VMware Tools that caused the guest to run out of memory.

VMware Player 1.0.1

This release addresses a security vulnerability that has been discovered in VMware Player. Since this issue is serious, VMware recommends that you install VMware Player 1.0.1 or disable NAT networking. For more details, refer the following Knowledge Base articles:

1