Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

VM Vulnerability Discovered on Multiple Platforms

US-CERT has issued a warning to organizations and systems providers focusing on a VM vulnerability, which if exploited, would allow the attacker to leave the guest environment; better known as a guest-to-host virtual machine escape.

US-CERT has issued a warning to organizations and systems providers focusing on a VM vulnerability, which if exploited, would allow the attacker to leave the guest environment; better known as a guest-to-host virtual machine escape.

The vulnerability exists on XEN, and only when running on an Intel chipset. Platform wise, the issue has been confirmed and patched on FreeBSD, Microsoft, NetBSD, Oracle, RedHat, SUSE Linux. Microsoft addressed the problem as part of their massive security released on Tuesday; the VM vulnerability itself is fixed with MS12-042.

“The security update addresses the vulnerabilities by correcting the way that the Windows User Mode Scheduler handles a particular system request and the way that Windows manages BIOS ROM,” Microsoft said.

“This security update is rated Important for all 32-bit editions of Windows XP and Windows Server 2003; Windows 7 for x64-based Systems; and Windows Server 2008 R2 for x64-based Systems.” According to XEN, setups that use an AMD CPU are not vulnerable, however the exploit will trigger a denial-of-service condition on some systems.

It’s important to note that VMWare is not impacted by this issue. Administrators are advised to patch as soon as possible. Likewise, if your organization uses VPS solutions, you will need to ensure your vendor is properly protected from this issue as well.

The full CERT advisory is here

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.