[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] [SECURITY] [DSA 2607-1] qemu-kvm security update



* jason:

> Could this be exploitable from within the guest vm?  Eg could I execute
> commands on the hypervisor host as root by generating a malicious packet to
> attack the e1000 driver from within the guest?

Yes, but at this point, you could directly patch the guest memory, so
it's not a real attack.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/