To All:

Last week, the U.S. Computer Emergency Readiness Team 
(US-CERT) reported a vulnerability, on Intel CPU hardware, that could 
lead to a privilege escalation attack on some 64-bit operating systems 
and virtualization softwares running on Intel CPU hardware.

In 
these years many security flaws have affected different virtualization 
platforms but this episode is remarkable because, originated at the CPU 
level, affects many different systems and not just a single vendor.

Two
 days ago US-CERT updated the list of the affected systems, that 
includes Windows 7, Windows Server 2008 R2, FreeBSD and NetBSD as well 
as Xen hypervisor, that we report in a “per Vendor” grouping.
======

Intel
 claims that this vulnerability is a software implementation issue, as 
their processors are functioning as per their documented specifications.
 However, software that does not take the unsafe SYSRET behavior 
specific to Intel processors into account may be vulnerable.
======

US-CERT
 in its security advisory, fortunately, VMware vSphere, which is still 
the most common hypervisor in the companies, does not seem to be 
affected from this problem.
=-=-=-=-=

Here is link to CERT's Advisory :

    http://www.kb.cert.org/vuls/id/649219  

Regards,

Harvey Rothenberg
System Integrator/Security Specialist


"Experience is a hard teacher because she gives the test first, the lesson 
afterwards." -- Unknown
_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to