<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Virtual Machines are No Security Blanket</title>
	<atom:link href="http://www.linux-mag.com/id/7665/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.linux-mag.com/id/7665/</link>
	<description>Open Source, Open Standards</description>
	<lastBuildDate>Sat, 05 Oct 2013 13:48:18 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.1</generator>
	<item>
		<title>By: editorial_response</title>
		<link>http://www.linux-mag.com/id/7665/#comment-7647</link>
		<dc:creator>editorial_response</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7665/#comment-7647</guid>
		<description>&lt;p&gt;Do you believe you have complete control over your system now, virtual or not?  I bet I could come up with a logic that could define a virtual machine that a sys admin maintains, and another system that an end user uses and neither would actually have control of either system and I could rewrite protocols so that data was a heck of a lot more secure across the entire nation.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>Do you believe you have complete control over your system now, virtual or not?  I bet I could come up with a logic that could define a virtual machine that a sys admin maintains, and another system that an end user uses and neither would actually have control of either system and I could rewrite protocols so that data was a heck of a lot more secure across the entire nation.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: sfandino</title>
		<link>http://www.linux-mag.com/id/7665/#comment-7648</link>
		<dc:creator>sfandino</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7665/#comment-7648</guid>
		<description>&lt;blockquote&gt;&lt;p&gt;Virtual machines are no more or less secure than physical machines&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;That\&#039;s just plain wrong, virtual machines are far less secure than physical ones!&lt;/p&gt;
&lt;p&gt;Virtualization software, as any other software, has bugs and these bugs can be exploited to take control of the VM process allowing execution of arbitrary code in the host. That would give an attacker &lt;strong&gt;full access to any sibling VMs&lt;/strong&gt; running there.&lt;/p&gt;
&lt;p&gt;Hardware also has bugs but hitting them will usually just leave you with a crashed machine instead of allowing you to access other servers in the neighborhood.&lt;/p&gt;
&lt;p&gt;Some real examples:&lt;/p&gt;
&lt;p&gt;http://news.zdnet.co.uk/security/0,1000000189,39661637,00.htm&lt;br /&gt;
http://news.softpedia.com/news/Guest-to-Host-Exploit-Found-in-VMware-Fusion-109530.shtml
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<blockquote><p>Virtual machines are no more or less secure than physical machines</p>
</blockquote>
<p>That\&#8217;s just plain wrong, virtual machines are far less secure than physical ones!</p>
<p>Virtualization software, as any other software, has bugs and these bugs can be exploited to take control of the VM process allowing execution of arbitrary code in the host. That would give an attacker <strong>full access to any sibling VMs</strong> running there.</p>
<p>Hardware also has bugs but hitting them will usually just leave you with a crashed machine instead of allowing you to access other servers in the neighborhood.</p>
<p>Some real examples:</p>
<p><a href="http://news.zdnet.co.uk/security/0,1000000189,39661637,00.htm" rel="nofollow">http://news.zdnet.co.uk/security/0,1000000189,39661637,00.htm</a><br />
<a href="http://news.softpedia.com/news/Guest-to-Host-Exploit-Found-in-VMware-Fusion-109530.shtml" rel="nofollow">http://news.softpedia.com/news/Guest-to-Host-Exploit-Found-in-VMware-Fusion-109530.shtml</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: cweberusa</title>
		<link>http://www.linux-mag.com/id/7665/#comment-7649</link>
		<dc:creator>cweberusa</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7665/#comment-7649</guid>
		<description>&lt;p&gt;Virtual machines have the one great advantage of effortless snapshots and easy provisioning. So while they are not any more secure than physical servers, recovery from an attack is much easier and quicker: Locate a snapshot from before the attack, spin it up in the lab (behind a firewall or off the net entirely), close the loophole, move it online, and you\&#039;re back in business. The big unknown in this scenario is \&quot;close the loophole\&quot;, of course.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>Virtual machines have the one great advantage of effortless snapshots and easy provisioning. So while they are not any more secure than physical servers, recovery from an attack is much easier and quicker: Locate a snapshot from before the attack, spin it up in the lab (behind a firewall or off the net entirely), close the loophole, move it online, and you\&#8217;re back in business. The big unknown in this scenario is \&#8221;close the loophole\&#8221;, of course.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: duncan</title>
		<link>http://www.linux-mag.com/id/7665/#comment-7650</link>
		<dc:creator>duncan</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7665/#comment-7650</guid>
		<description>&lt;p&gt;This is just about as dumb an article as I have ever seen.  Anytime you add anything to the mix it is probably less secure  period.&lt;/p&gt;
&lt;p&gt;Also, just restoring a machine doesn\&#039;t get you back to where you were, unless your just displaying a few flat web pages.  I guess I think in terms of actually doing something - like taking orders.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>This is just about as dumb an article as I have ever seen.  Anytime you add anything to the mix it is probably less secure  period.</p>
<p>Also, just restoring a machine doesn\&#8217;t get you back to where you were, unless your just displaying a few flat web pages.  I guess I think in terms of actually doing something &#8211; like taking orders.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: khess</title>
		<link>http://www.linux-mag.com/id/7665/#comment-7651</link>
		<dc:creator>khess</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7665/#comment-7651</guid>
		<description>&lt;p&gt;@sfandino&lt;/p&gt;
&lt;p&gt;Well, the first link you gave is for: Penetration-testing company Immunity has exploited a flaw in VMware software that allows malicious code running in a virtual machine to take over the host operating system. This would be similar to the LSASS worm killing other physical machines on a network of physical machines. This doesn\&#039;t make the VM less secure.&lt;/p&gt;
&lt;p&gt;And, same for the other one: \&quot;This is indeed a guest-to-host exploit,\&quot; Kortchinsky said in an e-mail, according to a Computerworld report. \&quot;It uses several vulnerabilities in the \&#039;Display functions\&#039; (as VMware put it) that allow [someone] to read and write arbitrary memory in the host. Thus, the guest can run some code on the host, effectively bypassing ASLR and DEP on Vista SP1.\&quot;&lt;/p&gt;
&lt;p&gt;Again, not VM security issues. &lt;/p&gt;
&lt;p&gt;@cweberusa&lt;/p&gt;
&lt;p&gt;You\&#039;re correct. You\&#039;d have to do that with a physical machine as well.&lt;/p&gt;
&lt;p&gt;@duncan&lt;br /&gt;
The VM itself is not less secure just because of its status as a VM.
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>@sfandino</p>
<p>Well, the first link you gave is for: Penetration-testing company Immunity has exploited a flaw in VMware software that allows malicious code running in a virtual machine to take over the host operating system. This would be similar to the LSASS worm killing other physical machines on a network of physical machines. This doesn\&#8217;t make the VM less secure.</p>
<p>And, same for the other one: \&#8221;This is indeed a guest-to-host exploit,\&#8221; Kortchinsky said in an e-mail, according to a Computerworld report. \&#8221;It uses several vulnerabilities in the \&#8217;Display functions\&#8217; (as VMware put it) that allow [someone] to read and write arbitrary memory in the host. Thus, the guest can run some code on the host, effectively bypassing ASLR and DEP on Vista SP1.\&#8221;</p>
<p>Again, not VM security issues. </p>
<p>@cweberusa</p>
<p>You\&#8217;re correct. You\&#8217;d have to do that with a physical machine as well.</p>
<p>@duncan<br />
The VM itself is not less secure just because of its status as a VM.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: sfandino</title>
		<link>http://www.linux-mag.com/id/7665/#comment-7652</link>
		<dc:creator>sfandino</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/7665/#comment-7652</guid>
		<description>&lt;p&gt;@khess, obviously you don\&#039;t understand the implications of a guest to host exploit!
&lt;/p&gt;
</description>
		<content:encoded><![CDATA[<p>@khess, obviously you don\&#8217;t understand the implications of a guest to host exploit!</p>
]]></content:encoded>
	</item>
</channel>
</rss>