Quote: |
These vulnerabilities allow an attacker to remotely execute code on the host operating system, which could be used to break out of the virtual machine. Although not trivial to construct, this attack is remote and requires no user interaction for success.
Once an attacker has control over the host operating system, additional attacks could be leveraged to compromise the entire virtual network. |
output generated using printer-friendly topic mod, All times are GMT + 2 Hours