• RSS
  • Twitter
  • FaceBook

Security Forums

Log in

FAQ | Search | Usergroups | Profile | Register | RSS | Posting Guidelines | Recent Posts

Infection through a Virtual machine setup

Users browsing this topic:0 Security Fans, 0 Stealth Security Fans
Registered Security Fans: None
Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Viruses // Worms

View previous topic :: View next topic  
Author Message
raednashat
Just Arrived
Just Arrived


Joined: 18 Mar 2006
Posts: 0


Offline

PostPosted: Thu Sep 06, 2007 11:58 pm    Post subject: Infection through a Virtual machine setup Reply with quote

Hi,

In a virtual setup , is it posible for the host to infect the guest machine or vice versa?

Kindly explain

Thanks
Back to top
View user's profile Send private message
Advocate
Just Arrived
Just Arrived


Joined: 31 Aug 2006
Posts: 0
Location: Amsterdam, NL

Offline

PostPosted: Fri Sep 07, 2007 3:06 pm    Post subject: Reply with quote

Through security holes in the VM software it IS possible yes.
Back to top
View user's profile Send private message
AdamV
SF Mod
SF Mod


Joined: 06 Oct 2004
Posts: 24
Location: Leeds, UK

Offline

PostPosted: Sat Sep 08, 2007 12:24 am    Post subject: Reply with quote

How about this:
http://www.microsoft.com/technet/security/Bulletin/MS07-049.mspx
Back to top
View user's profile Send private message Visit poster's website
Ipsec Espah
Just Arrived
Just Arrived


Joined: 16 Mar 2003
Posts: 4


Offline

PostPosted: Sat Sep 08, 2007 2:05 pm    Post subject: Reply with quote

I would think it would also be possible over a the pseudo network connection, if your host or guest OS is vulnerable.
Back to top
View user's profile Send private message
PhiBer
SF Mod
SF Mod


Joined: 11 Mar 2003
Posts: 20
Location: Your MBR

Offline

PostPosted: Sat Sep 22, 2007 12:29 am    Post subject: Reply with quote

Yes, it is possible.

Quote:
These vulnerabilities allow an attacker to remotely execute code on the host operating system, which could be used to break out of the virtual machine. Although not trivial to construct, this attack is remote and requires no user interaction for success.

Once an attacker has control over the host operating system, additional attacks could be leveraged to compromise the entire virtual network.
Back to top
View user's profile Send private message
Display posts from previous:   

Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Viruses // Worms All times are GMT + 2 Hours
Page 1 of 1


 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Community Area

Log in | Register