Here's the final update of VMware Workstation that is powerful desktop virtualization software for software developers/testers and enterprise IT professionals that runs multiple operating systems simultaneously on a single PC.
VMware Workstation 8.0.4 Build 744019
Users can run Windows, Linux, NetWare, or Solaris x86 in fully networked, portable virtual machines with no rebooting or hard drive partitioning required. VMware Workstation delivers excellent performance and advanced features such as memory optimization and the ability to manage multi-tier configurations and multiple snapshots. With millions of customers and dozens of major product awards over the last six years, VMware Workstation is a proven technology that improves productivity and flexibility. An indispensable tool for software developers and IT professionals worldwide.
Resolved Issues in VMware Workstation 8.0.4 Build 744019 | 13 JUNE 2012:
* Linux guests running the Linux kernel version 2.6.34 or later could not be pinged from the host via an IPv6 address.
* On rare occasions, Linux guests would suddenly fail to Autofit or enter Unity.
* Unity mode would exit if the title bar of an application contained certain non UTF-8 encoded extended ASCII characters.
* On Windows hosts, the VMware Workstation user interface sometimes became unresponsive when minimized from full-screen mode if the suggestion balloon was being displayed.
* On Windows hosts, the user interface sometimes became unresponsive if the application was rendered on an extended display that was abruptly disconnected.
* VMware host Checkpoint file memory corruption. Input data was not properly validated when loading Checkpoint files. This issue could have allowed an attacker with the ability to load a specially crafted Checkpoint file to execute arbitrary code on the host.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-3288 to this issue.
* VMware virtual machine remote device denial of service. A device (such as CD-ROM or keyboard) that is available to a virtual machine while physically connected to a system that does not run the virtual machine is referred to as a remote device. Traffic coming from remote virtual devices was incorrectly handled. This issue could have allowed an attacker who was capable of manipulating the traffic from a remote virtual device to crash the virtual machine. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-3289 to this issue.
Homepage - http://vmware.com