<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>virtualbox vulnerability Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/virtualbox-vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Wed, 07 Nov 2018 08:09:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>VirtualBox Zero-day Vulnerability</title>
		<link>https://www.osradar.com/virtualbox-zero-day-vulnerability/</link>
					<comments>https://www.osradar.com/virtualbox-zero-day-vulnerability/#comments</comments>
		
		<dc:creator><![CDATA[osradar_editor]]></dc:creator>
		<pubDate>Wed, 07 Nov 2018 08:09:49 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[virtualbox]]></category>
		<category><![CDATA[virtualbox linux]]></category>
		<category><![CDATA[virtualbox vulnerability]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=7059</guid>

					<description><![CDATA[<p>VirtualBox has always been one of the most popular virtualization software on the market. It’s free, open-source and available on all the platforms. VirtualBox is currently developed and maintained by Oracle. Recently, a Russian vulnerability researcher and exploit dev published detailed info about a zero-day vulnerability in VirtualBox. His explanation includes a step-by-step guide on [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/virtualbox-zero-day-vulnerability/">VirtualBox Zero-day Vulnerability</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>VirtualBox has always been one of the most popular virtualization software on the market. It’s free, open-source and available on all the platforms. VirtualBox is currently developed and maintained by Oracle.</p>
<p>Recently, a Russian vulnerability researcher and exploit dev published detailed info about a zero-day vulnerability in VirtualBox. His explanation includes a step-by-step guide on exploiting the bug. The bug is present on the software itself, allowing all the platforms to be vulnerable.</p>
<p>Using the bug, an attacker would easily escape the virtual environment and reach the Ring 3 privilege layer – a layer for running code from most user programs with the least privileges.</p>
<h1>How the vulnerability works</h1>
<p><img loading="lazy" class="size-full wp-image-7064 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-2.jpg" alt="" width="1000" height="619" srcset="https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-2.jpg 1000w, https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-2-300x186.jpg 300w, https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-2-768x475.jpg 768w, https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-2-356x220.jpg 356w, https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-2-696x431.jpg 696w, https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-2-679x420.jpg 679w" sizes="(max-width: 1000px) 100vw, 1000px" /></p>
<p>According to Sergey Zelenyuk who identified the bug, shows details on how the bug can be leveraged on virtual machines configured with the “Intel PRO/1000 MT Desktop (82540EM)” network adapter in NAT mode. It’s the default setup of all the guest systems for accessing external networks.</p>
<p><img loading="lazy" class="size-full wp-image-7062 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-1.png" alt="" width="750" height="489" srcset="https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-1.png 750w, https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-1-300x196.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-1-696x454.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-1-644x420.png 644w" sizes="(max-width: 750px) 100vw, 750px" /></p>
<p>According to a <a href="https://github.com/MorteNoir1/virtualbox_e1000_0day">technical write-up by Zelenyuk</a>, the network adapter is vulnerable that allows an attacker with root/admin privilege to escape to the host Ring 3. Then, using existing techniques, the attacker can escalate privileges to Ring 0 via /dev/vboxdrv.</p>
<p>The researcher describes the mechanics in detail, showing how to create the necessary conditions for obtaining a buffer overflow to abuse and escape the virtual confinement.</p>
<h1>100% Reliable</h1>
<p><img loading="lazy" class="size-full wp-image-7063 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-3.jpg" alt="" width="1200" height="628" srcset="https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-3.jpg 1200w, https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-3-300x157.jpg 300w, https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-3-768x402.jpg 768w, https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-3-1024x536.jpg 1024w, https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-3-696x364.jpg 696w, https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-3-1068x559.jpg 1068w, https://www.osradar.com/wp-content/uploads/2018/11/virtualbox-3-803x420.jpg 803w" sizes="(max-width: 1200px) 100vw, 1200px" /></p>
<p>The exploit Zelenyuk wrote relies on the 2 conditions. Although not impossible, an attacker has to chain another vulnerability for granting them increased privilege on the host system.</p>
<p>Here’s a demo he showed.</p>
<p><iframe loading="lazy" src="https://player.vimeo.com/video/299325088?app_id=122963" width="696" height="391" frameborder="0" title="VirtualBox E1000 Guest-to-Host Escape" allow="autoplay; fullscreen" allowfullscreen></iframe></p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/virtualbox-zero-day-vulnerability/">VirtualBox Zero-day Vulnerability</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/virtualbox-zero-day-vulnerability/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
