Real Holes in Virtual Machines

Discussion in 'other security issues & news' started by ronjor, Apr 23, 2007.

Thread Status:
Not open for further replies.
  1. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    57,727
    Location:
    Texas
    Article
     
  2. Pedro

    Pedro Registered Member

    Joined:
    Nov 2, 2006
    Posts:
    3,502
    Buffer overruns. It seems to be the primary weakness in sandboxing in general. I still haven't sink in the concept though.
     
  3. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    8,695
    Hello,
    Okay ... but again, PoC ... Easier said than done.
    Mrk
     
  4. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    8,026
    Location:
    The Netherlands
    Well, this is no surprise, let´s hope that it´s fixed by the vendors. However, if you look at which vulnerabilities where found in VMWare they didn´t look super scary to me (malware would have to be real advanced to exploit it I think), and I had expected to see more holes. Btw, what´s this CWSandbox thing about?
     
  5. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    17,040
    The other factor that comes into play is why mess around trying to do someting exotic to bypass the relatively few vm machines, when you can do something simple and snag thousands of still unprotected machines.
     
  6. flinchlock

    flinchlock Registered Member

    Joined:
    Jan 30, 2005
    Posts:
    554
    Location:
    Michigan
  7. Meriadoc

    Meriadoc Registered Member

    Joined:
    Mar 28, 2006
    Posts:
    2,642
    Location:
    Cymru
    You took the words right outta my mouth Pete although enterprise hardware turnover is contributing in making virtual machines increase every year!
    As for VMWare, the few holes over the years have been plugged reletivly quickly and only really served to disrupt the VMs until VMWares other features come into play and update the VM, other holes are POC. Good recommendations there in the pdf of disabling unnecessary modules and stuff you just don't need, keeping software upto date, privileges and taking advantage of BSD systems.

    EDIT wait a minute, Pete your in blue when did this happen :)
     
    Last edited: May 14, 2007
  8. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    17,040
    Sunday. It was cold and I turned blue:D
     
Loading...
Thread Status:
Not open for further replies.