CVE-2015-3456 VENOM vulnerability

Added on - 19 Sep 2019

  • 3

    Pages

  • 1028

    Words

  • 112

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 1 of 3 pages
ContentsExecutive Summary...............................................................................................................................1Technical Description............................................................................................................................1Vulnerability Description..................................................................................................................1Attack Vector....................................................................................................................................2Exploitation Scenario........................................................................................................................2Mitigation..........................................................................................................................................2Remediation.......................................................................................................................................3References.............................................................................................................................................3Executive SummaryCVE-2015-3456 or more commonly known as the VENOM vulnerability is a type ofvulnerability which exsts in the virtual floppy drive code that was being used by manyvrtualization systems. This particular vulnerability allows an attacker to excape from thesandbox of the VM guest to potentntially obtain a code-execution level access to the Guestoperating system. If there is no blocking mechanism in place, an attack that takes place viathis vulnerability would access the host operating system and any subsequent VMs runningon this particular host. Successful exploitation of VM vulnerability could potentially exposeunauthenticated access to IP or Intellectual Property of the Corporate and additionally revealpersonally identifiable and sensitive information that affects the lives of millions of usersworldwide. These users are those that make use of VM or use VPS services involving sharedcomputer resources, storage, and connectivity and security services.Technical DescriptionVulnerability DescriptionVENOM stands for Virtualized Environtment Neglected Operation Manipulation and is azero day flow that takes full advantage of the ‘Virtual Floppy Disk Drive Controller’. Thisvulnerability potentially allows the attacker to exit the boundaries of the VM environmentand spill over to the host operating system including other VMs on that host. Crowdstrike, arenowned security intelligence corporation has discovered this vulnerability and explains thatthe attacker has first to gain root level privileges of the system in order to make use of thisvulnerability. This is a major barrier to this particular exploitation, however it is not
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document