Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <ba24ac6088a34b9d97fd721591f1e922@casmbox01.crowdstrike.sys>
Date: Wed, 13 May 2015 12:22:19 +0000
From: Jason Geffner <jason@...wdstrike.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: VENOM - CVE-2015-3456

VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host. Absent mitigation, this VM escape could open access to the host system and all other VMs running on that host, potentially giving adversaries significant elevated access to the host's local network and adjacent systems.

Exploitation of the VENOM vulnerability can expose access to corporate intellectual property (IP), in addition to sensitive and personally identifiable information (PII), potentially impacting the thousands of organizations and millions of end users that rely on affected VMs for the allocation of shared computing resources, as well as connectivity, storage, security, and privacy.

Please see http://venom.crowdstrike.com/ for further details.

Sincerely,
Jason Geffner
Sr. Security Researcher, CrowdStrike

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.