this post was submitted on 18 May 2024
336 points (92.9% liked)
Weird News - Things that make you go 'hmmm'
908 readers
130 users here now
Rules:
-
News must be from a reliable source. No tabloids or sensationalism, please.
-
Try to keep it safe for work. Contact a moderator before posting if you have any doubts.
-
Titles of articles must remain unchanged; however extraneous information like "Watch:" or "Look:" can be removed. Titles with trailing, non-relevant information can also be edited so long as the headline's intent remains intact.
-
Be nice. If you've got nothing positive to say, don't say it.
Violators will be banned at mod's discretion.
Communities We Like:
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Surely breaking out of a VM requires exploiting a vulnerability of the VM, not of the OS running in it?
I would assume it requires both a hypervisor and guest OS bug to be tripped.
It's pure speculation, but I assume you'll need
Sounds like quite a bit of work, but I don't see why malware couldn't automate it. An up-to-date hypervisor should help reduce the risk though.
Theres no way an hypervisor zero day gets implemented in some random Malware. Those are worth millions and are used in coordinated manual attacks against VIP targets
Yeah a zero-day would be very unlikely, but a months-old, publically known and patched vulnerability could always be attempted. One of the reasons why the hypervisor should definitely be kept up-to-date. There is always someone who forgets to patch their software, why not give it a try? We're talking about a Windows XP scenario after all!
It's XP. There's guaranteed to be a way to go from userland to ring 0 code execution.