Eugeniu Patrascu wrote:
Mihai Badici wrote:
As putea, dar nu mai am o separare a resurselor. Daca am o problema cu
softul de wiki as prefera sa nu existe posibilitatea de a impacta si
alte aplicatii de ruleaza pe aceeasi masina.
Ai garantia ca daca o masina virtuala e compromisa atacatorul nu
poate "sparge bariera virtuala" ?
Stii tu de vre-un atac care sa poata compromite un host avand "root"
access intr-o masina virtuala gazduita pe acel host ?
http://lists.vmware.com/pipermail/security-announce/2009/000055.html
(/Fri Apr 10 08:43:46 PDT 2009)/
3. Problem Description
a. Host code execution vulnerability from a guest operating system
A critical vulnerability in the virtual machine display function
*might allow a guest operating system to run code on the host.
*
This issue is different from the vulnerability in a guest virtual
device driver reported in VMware security advisory VMSA-2009-0005
on 2009-04-03. That vulnerability can cause a potential denial of
--
'Government is like a baby: An alimentary canal with a big
appetite at one end and no sense of responsibility at the other.'
_______________________________________________
RLUG mailing list
[email protected]
http://lists.lug.ro/mailman/listinfo/rlug