RE: VMWare poor guest isolation design

看板Bugtraq作者時間18年前 (2007/08/31 00:33), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串9/9 (看更多)
On Sat, 25 Aug 2007, Ken Kousky wrote: > I'm trying to understand how the vm actually prevents the buffer overflow > from injecting code that has direct hardware control? It seems that the code > injected into memory should be truly "arbitrary code" based on the physical > machine. First off, you need to understand what a buffer overflow is -- in most cases it's not an attack on the hardware, it's an attack on the process. Which is usually running in its own protected address space. In short, vms don't alleviate or protect you from buffer overflows (crap code is still crap inside of a guest), but running a service in a dedicated vm versus on a host with other concurrent services reduces the information leakage should the service be subverted. That's all. --Arthur Corliss Live Free or Die
文章代碼(AID): #16rl5X00 (Bugtraq)
討論串 (同標題文章)
文章代碼(AID): #16rl5X00 (Bugtraq)