meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, November 8th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 8 November 2018

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. VirtualBox 0 Day; WooCommerce RCE #wordpress; Bing Notepad2 Malware; @Bsidesjax

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, November 8, 2018 edition of the Sansonet Storm Center's

0:07.1

Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:13.8

If you're using Oracle's virtual box, be aware there is a new Saturday exploit available

0:20.6

that will allow a guest to break out

0:24.1

and execute code on the host. The problem here is the virtual Intel E-1000 network card

0:31.7

that's being immolated in Virtual Box. If it's configured in Nat mode, which is quite common, then you will be subject

0:40.9

to an integer overflow that can then be leveraged for a buffer overflow.

0:46.6

A blog post with details about this vulnerability, proof of concept code, and also a video

0:53.1

demo of the exploit has been made available by a Russian

0:56.7

researcher. In order to exploit this vulnerability, the attacker has to first replace the

1:04.7

network car driver in the guest. Now, the attacker does need root access inside a guest to accomplish that. But again,

1:13.6

remember, we're talking about a virtual machine escape and it's very typical that you're using

1:19.7

virtual machines in order to keep users apart from each other, even if they have root access

1:25.9

to their individual virtual machines.

1:29.5

Now, with a successful exploit, the attacker then gains user access to the host.

1:35.2

Not necessarily root access, another privilege escalation exploit would be required to accomplish that.

1:42.1

As far as countermeasures go, there is no patch available yet. Oracle

1:46.6

was not notified ahead of the release of this blog post and exploit. However, you could switch

1:54.2

to a different network card or you could not use Nat mode. The first is probably easier than the later, but it may require

2:05.2

that you're loading the right drivers and such in your virtual machines, so not necessarily easy

2:10.2

to just switch over. And while the exploit was only demonstrated on Ubuntu Linux running

2:16.5

within the guest, this is a vulnerability in Virtual Box, not in Ubuntu Linux running within the guest.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.