Citrix Systems, Inc. (NASDAQ: CTXS), the global leader in application delivery infrastructure, today announced a definitive agreement to acquire XenSource, Inc. of Palo Alto, Calif., a privately held leader in enterprise-grade virtual infrastructure solutions, for approximately $500 million in a combination of cash and stock, which includes the assumption of approximately $107 million in unvested stock options. This acquisition moves Citrix into adjacent server and desktop virtualization markets, expected by Citrix to grow to nearly $5 billion over the next four years.1 The combination of Citrix and XenSource brings together significant customer, technical, channel and go-to-market synergies. This will allow Citrix to extend its leadership in the broader Application Delivery Infrastructure market by adding key enabling technologies that make the end-to-end computing environment far more flexible, dynamic and responsive to business change. The acquisition will also strengthen each company’s strong partnership with Microsoft and commitment to the Windows platform.The acquisition is expected to close in the fourth quarter of 2007 subject to the satisfaction of closing conditions.
vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus
Comments
Post a Comment