VENOM explained
VENOM (short for Virtualized Environment Neglected Operations Manipulation[1]) is a computer security flaw that was discovered in 2015 by Jason Geffner, then a security researcher at CrowdStrike.[2] The flaw was introduced in 2004 and affected versions of QEMU, Xen, KVM, and VirtualBox from that date until it was patched following disclosure.[3] [4]
The existence of the vulnerability was due to a flaw in QEMU's virtual floppy disk controller.[5]
VENOM is registered in the Common Vulnerabilities and Exposures database as .[6]
Notes and References
- Book: Richard A. Clarke . Robert K. Knake . 2019 . The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats . Penguin . 320– . 978-0-525-56197-2 .
- Web site: VENOM Vulnerability . Venom.crowdstrike.com . https://web.archive.org/web/20150513104122/http://venom.crowdstrike.com/ . May 13, 2015 . dead .
- Web site: Bigger than Heartbleed, 'Venom' security vulnerability threatens most datacenters. Whittaker. Zack. . May 13, 2015. 11 November 2017.
- Web site: Extremely serious virtual machine bug threatens cloud providers everywhere. Dan Goodin. May 14, 2015. Ars Technica. 11 November 2017.
- News: Venom Security Flaw: Bug Exploits Floppy Drive, But Researchers Say Threat Overstated. Stone. Jeff. May 14, 2015. International Business Times. IBT Media. 11 November 2017.
- Book: Marc Dacier . Michael Bailey . Michalis Polychronakis . Manos Antonakakis . 2017 . Research in Attacks, Intrusions, and Defenses: 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings . Springer . 422– . 978-3-319-66332-6 .