|
Message-ID: <ba24ac6088a34b9d97fd721591f1e922@casmbox01.crowdstrike.sys> Date: Wed, 13 May 2015 12:22:19 +0000 From: Jason Geffner <jason@...wdstrike.com> To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: VENOM - CVE-2015-3456 VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host. Absent mitigation, this VM escape could open access to the host system and all other VMs running on that host, potentially giving adversaries significant elevated access to the host's local network and adjacent systems. Exploitation of the VENOM vulnerability can expose access to corporate intellectual property (IP), in addition to sensitive and personally identifiable information (PII), potentially impacting the thousands of organizations and millions of end users that rely on affected VMs for the allocation of shared computing resources, as well as connectivity, storage, security, and privacy. Please see http://venom.crowdstrike.com/ for further details. Sincerely, Jason Geffner Sr. Security Researcher, CrowdStrike
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.