Google's GotchaGoogle's Gotcha

Intern lists exploits against commercial and open source virtualization products.

Joe Hernick, IT Director

August 31, 2007

1 Min Read
information logo in a gray background | information

Tavis Ormandy, a Google intern working on security issues in virtualized environments, stirred things up this past spring at CanSecWest in Vancouver, British Columbia. In his research paper, with the catchy title "An Empirical Study Into The Security Exposure To Hosts Of Hostile Virtualized Environments," Ormandy detailed a long list of successful exploits against commercial and open source virtualization products. While they were "inside-out" vulnerabilities--attacks launched from within a guest OS against the VM host--he discovered flaws on every platform tested, and one of the real-world outcomes of his research was a production patch to VMware's ESX Server resolving two potential denial-of-service flaws and addressing other concerns. Continue to the sidebar:
Desktops In Play? Return to the story:
Virtualization Security Heats Up

Read more about:

20072007

About the Author

Joe Hernick

IT Director

Joe Hernick is in his seventh year as director of academic technology at Suffield Academy, where he teaches, sits on the Academic Committee, provides faculty training and is a general proponent of information literacy. He was formerly the director of IT and computer studies chair at the Loomis Chaffee School in Windsor, CT, and spent 10 years in the insurance industry as a director and program manager at CIGNA.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights