Vizioncore Inc., the market leader in management tools for virtual infrastructure environments, today announced the Vizioncore Authorised Learning Centre (VALC) program, allowing distribution partners to offer approved training courses on Vizioncore’s products. The tailored training programs will be delivered by Vizioncore Authorised Instructors (VAI), and those individuals who successfully complete a course will be accredited as Vizioncore Technical Professionals (VTP). Distribution partners who join up to the VALC will benefit from greater access to free software for tuition purposes as well as technical support and official teaching materials.Link
“As virtualisation moves into the mainstream, customers across the globe are becoming increasingly aware of its benefits, but as with any new and groundbreaking technology, customers require specific skills and education to take full advantage of it,” said Colin Wright, Regional Director, Northern Europe at Vizioncore. “We have developed the VALC program in collaboration with our partners, to ensure they have the skills, materials and support to deliver first-class training to existing and prospective customers. Our distribution partners will be able to build closer and more profitable relationships with these organisations, while customers will be able to gain a far fuller understanding of Vizioncore’s technology.”
vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus
Comments
Post a Comment