<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Venom Security Vulnerability</title>
	<atom:link href="http://www.epanorama.net/blog/2015/05/13/venom-security-vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2015/05/13/venom-security-vulnerability/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 05 Apr 2026 18:35:45 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2015/05/13/venom-security-vulnerability/comment-page-1/#comment-1393195</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 19 May 2015 07:40:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=31890#comment-1393195</guid>
		<description><![CDATA[Oracle releases antidote for VENOM vulnerability
Patch but don&#039;t panic
http://www.theregister.co.uk/2015/05/19/oracle_patches_venom/

Oracle has released patches for its virtualisation software to crimp the VENOM vulnerability that allows attackers to break out of virtual machines to attack hosts.

The company follows a host of others including KVM and Xen which have patched the buffer overflow bug. VMware, Microsoft, and Bochs are immune to the problem.

Researcher Jason Geffner of threat intelligence outfit Crowdstrike quietly tipped off vendors including Oracle to VENOM (Virtualised Environment Neglected Operations Manipulation) (CVE-2015-3456) and notified the Oracle, QEMU, and Xen mailing lists.

&quot;The vulnerable virtual Floppy Disk Controller (FDC) code is included in various virtualisation platforms and is used in some Oracle products,&quot; the company says in a patch advisory.

&quot;The vulnerability may be exploitable by an attacker who has access to an account on the guest operating system with privilege to access the FDC.

The vulnerability can only be remotely exploited if attackers are logged into a box but Oracle still considers it severe enough to &quot;strongly recommend&quot; customers apply the patches and reboot as soon as possible.

That limitation prevented mass exploitation.

Affected versions include VirtualBox 3.2, 4.0, 4.1, 4.2, and 4.3 prior to 4.3.28; Oracle VM 2.2, 3.2, and 3.3, and Oracle Linux 5, 6, and 7.]]></description>
		<content:encoded><![CDATA[<p>Oracle releases antidote for VENOM vulnerability<br />
Patch but don&#8217;t panic<br />
<a href="http://www.theregister.co.uk/2015/05/19/oracle_patches_venom/" rel="nofollow">http://www.theregister.co.uk/2015/05/19/oracle_patches_venom/</a></p>
<p>Oracle has released patches for its virtualisation software to crimp the VENOM vulnerability that allows attackers to break out of virtual machines to attack hosts.</p>
<p>The company follows a host of others including KVM and Xen which have patched the buffer overflow bug. VMware, Microsoft, and Bochs are immune to the problem.</p>
<p>Researcher Jason Geffner of threat intelligence outfit Crowdstrike quietly tipped off vendors including Oracle to VENOM (Virtualised Environment Neglected Operations Manipulation) (CVE-2015-3456) and notified the Oracle, QEMU, and Xen mailing lists.</p>
<p>&#8220;The vulnerable virtual Floppy Disk Controller (FDC) code is included in various virtualisation platforms and is used in some Oracle products,&#8221; the company says in a patch advisory.</p>
<p>&#8220;The vulnerability may be exploitable by an attacker who has access to an account on the guest operating system with privilege to access the FDC.</p>
<p>The vulnerability can only be remotely exploited if attackers are logged into a box but Oracle still considers it severe enough to &#8220;strongly recommend&#8221; customers apply the patches and reboot as soon as possible.</p>
<p>That limitation prevented mass exploitation.</p>
<p>Affected versions include VirtualBox 3.2, 4.0, 4.1, 4.2, and 4.3 prior to 4.3.28; Oracle VM 2.2, 3.2, and 3.3, and Oracle Linux 5, 6, and 7.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
