Vulnerability in Virtual PC?

JMH

Banned
Earlier today, Core Security Technologies issued a security advisory for our Virtual PC (VPC) software. The advisory calls out a proof of concept where the virtual machine monitor allows memory pages above the 2GB level to be read from or written to by user-space programs running within a guest operating system. The advisory explicitly calls into question the effectiveness of many of the security hardening features of Windows, including DEP, SafeSEH, and ASLR. Folks are already starting to ask questions about this advisory, so I thought it would be best to answer them here.
Source -
Vulnerability in Virtual PC? - Windows Security Blog - The Windows Blog
 

My Computer

System One

  • Manufacturer/Model
    LAPTOP. HP Pavilion dv7-1005TX .
    CPU
    IntelCore [email protected] x2
    Memory
    4.00 GB installed, max capacity 8 GB.
    Graphics Card(s)
    Nvidia GeForce 9600M GT & 512MB DDR2 dedicated graphics mem.
    Monitor(s) Displays
    17.0" diagonal WXGA + High definition brightview widescreen infinity display.
    Screen Resolution
    1440 x 900
    Hard Drives
    SPECS.
    Drive 1. 298.09 GB Fujitzu MHZ2320BH G2 ATA Device
    Drive 2. [ All as above.]

    CONFIG. C:\287.65 GB, D:\298.09 GB, E:\10.44 GB.
    Case
    Laptop / notebook.
    Cooling
    Stock.
    Keyboard
    IBM enhanced
    Mouse
    Synaptics PS/2 Port touch pad.
    Internet Speed
    ADSL [ Too slow.]
    Other Info
    Webcam.
Back
Top