[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] [SECURITY] [DSA 2607-1] qemu-kvm security update
- To: jason <sword23@xxxxxxxxx>
- Subject: Re: [Full-disclosure] [SECURITY] [DSA 2607-1] qemu-kvm security update
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Date: Sun, 04 Aug 2013 15:49:50 +0200
* jason:
> Could this be exploitable from within the guest vm? Eg could I execute
> commands on the hypervisor host as root by generating a malicious packet to
> attack the e1000 driver from within the guest?
Yes, but at this point, you could directly patch the guest memory, so
it's not a real attack.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/