What effect would this same hack have on the intended target if the x86
system being targeted was running as a guest under z/VM?  Wouldn't the ill
effects be reduced by the wall between virtual guests inherent with z/VM?


On 11/4/08 11:42 AM, "David Boyes" <[EMAIL PROTECTED]> wrote:

>  
>> It seems our colleagues doing virtualization on Intel have another
>> possible security
>> concern to worry about now.....
>>> By far the biggest concern related to virtual machine security is
> the
>> threat of
>>> a virtual machine escape. A virtual machine escape is a theoretical
> type
>> of
>>> attack in which an attacker uses a vulnerability within a virtual
>> machine to
>>> take control of either the underlying host operating system, or the
>> hypervisor
>>> itself. Upon doing so, the attacker could potentially gain control
> of
>> the other
>>> virtual machines hosted on the server.
>>> 
>>> Why is it such a threat? It's the fear of the unknown, that
> eventually
>> someone
>>> will be able to do it.
> 
> Not just possible; proven. It's been done on an Intel Pacifica chipset,
> and there was an excellent paper in IEEE Transactions on Computer
> Systems on how it was done.
> 

--.  .-  .-.  -.--

Gary Dennis
Mantissa Corporation
1121 Edenton Street
Birmingham, Alabama 35242-9257

p: 205.968-3942
m: 205.218-3937
f: 205.968.3932

[EMAIL PROTECTED]

http://www.mantissa.com
http://www.idovos.com

Reply via email to