• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Virtualization.com

Virtualization.com

News and insights from the vibrant world of virtualization and cloud computing

  • News
  • Featured
  • Partnerships
  • People
  • Acquisitions
  • Guest Posts
  • Interviews
  • Videos
  • Funding

vulnerability

Is Virtualization The Biggest Security Vulnerability In IT Today?

April 9, 2008 by Robin Wauters 2 Comments

The question is asked by Senior Reporter from Forbes Andy Greenberg, who attended the security industry’s big annual confab, the RSA Conference, and wrote up an article aptly titled ‘Virtualization Dark’s Side’. He writes:

“In the past few months, security researchers have revealed bugs in practically every piece of virtualization software, including products from virtualization heavyweights VMware and Microsoft.

Exploiting those bugs, attackers can use what researchers call “virtual machine escape,” or “hyperjacking.” By taking control of the hypervisor, the piece of software that controls all the virtual computers within a machine, an attacker can “escape” from any single virtual computer hosted on the machine and quickly multiply his or her access to a company’s data.”

Virtualization security researchers and experts were quick to point out the weaknesses of virtualization and several techniques to breach the security.

Joanna Rutkowska, the founder of security research firm Invisible Things Lab, reportedly described a new type of virtualization-based malware that could be used to take control of a machine running virtualization software. Because virtualization allows companies to store many virtualized software “images” of computers on a single physical machine, an attack like the one Rutkowska envisions would allow a hacker “not only to control a single machine but to siphon data from any virtual machine it contains”.

Rutkowska also described how an intruder could install what she calls a “blue pill,” a second, malicious hypervisor that controls the original hypervisor and all of the virtual machines beneath it.

Fortunately, she also said that the attacks she discussed are likely too new to have ever been used by real-world cybercriminals, and are unlikely to become common.

What do you think?

Filed Under: Featured, Interviews, News, People Tagged With: Invisible Things Lab, Joanna Rutkowska, malware, research, RSA Conference, security, threat, virtualisation, virtualization, virtualization security, vulnerability

Live Virtual Machine Migration Vulnerability

March 24, 2008 by Kris Buytaert Leave a Comment

Anthony Liguori has a good summary of the Blackhat paper by Jon Oberheide, Evan Cooke and Farnam Jahanian of the University of Michigan about Xensploit .

Black Hat Logo

The idea of Xensploit is to use a Man in the Middle attack between 2 hosts performing a Live migration. The fundamental flaw is that by default Live migration of virtual machines is unencrypted or often even unauthenticated. Of course good network security practice isolates this kind of traffic in it’s own VLAN, but it shows that security is becoming a bigger issue day by day.

The vulnerability seems to be present with VMWare and Xen versions prior to 3.1 but according to Anthony not with KVM.

Filed Under: News Tagged With: Anthony Liguory, Blackhat, Evan Cooke, Farnam Jahanian, kvm, live migration, on Oberheide, vmware, vulnerability, Xen, xensploit

Primary Sidebar

Tags

acquisition application virtualization Cisco citrix Citrix Systems citrix xenserver cloud computing Dell desktop virtualization EMC financing Funding Hewlett Packard HP Hyper-V IBM industry moves intel interview kvm linux microsoft Microsoft Hyper-V Novell oracle Parallels red hat research server virtualization sun sun microsystems VDI video virtual desktop Virtual Iron virtualisation virtualization vmware VMware ESX VMWorld VMWorld 2008 VMWorld Europe 2008 Xen xenserver xensource

Recent Comments

  • C program on Red Hat Launches Virtual Storage Appliance For Amazon Web Services
  • Hamzaoui on $500 Million For XenSource, Where Did All The Money Go?
  • vijay kumar on NComputing Debuts X350
  • Samar on VMware / SpringSource Acquires GemStone Systems
  • Meo on Cisco, Citrix Join Forces To Deliver Rich Media-Enabled Virtual Desktops

Copyright © 2025 · Genesis Sample on Genesis Framework · WordPress · Log in

  • Newsletter
  • Advertise
  • Contact
  • About