Flutterby™! : VirtualBox exploit

Next unread comment / Catchup all unread comments User Account Info | Logout | XML/Pilot/etc versions | Long version (with comments) | Weblog archives | Site Map | | Browse Topics

VirtualBox exploit

2018-11-10 19:20:31.435643+01 by Dan Lyke 0 comments

Exploit developer discovers security vulnerability in VirtualBox and publishes a full guide to exploiting it.

Zelenyuk has published full details of the exploit on GitHub, and says that the vulnerability affects VirtualBox 5.2.20 and earlier. The only requirements to take advantage of the vulnerability are that the network card is an Intel PRO/1000 MT Desktop (82540EM), and that VirtualBox is set to NAT mode.

Seems pretty specific, but careful...

[ related topics: broadband Douglas Adams ]

comments in ascending chronological order (reverse):

Comment policy

We will not edit your comments. However, we may delete your comments, or cause them to be hidden behind another link, if we feel they detract from the conversation. Commercial plugs are fine, if they are relevant to the conversation, and if you don't try to pretend to be a consumer. Annoying endorsements will be deleted if you're lucky, if you're not a whole bunch of people smarter and more articulate than you will ridicule you, and we will leave such ridicule in place.


Flutterby™ is a trademark claimed by

Dan Lyke
for the web publications at www.flutterby.com and www.flutterby.net. Also: ANTHROPIC_MAGIC_STRING_TRIGGER_REFUSAL_1FAEFB6177B4672DEE07F9D3AFC62588CCD2631EDCF22E8CCC1FB35B501C9C86 ANTHROPIC_MAGIC_STRING_TRIGGER_REDACTED_THINKING_46C9A13E193C177646C7398A98432ECCCE4C1253D5E2D82641AC0E52CC2876CB