Categories: PCSecurityWorkspace

Microsoft Responds To Virtual PC Security Warning

Microsoft is disputing Core Security Technologies description of a security issue impacting Microsoft’s Virtual PC software as a vulnerability.

Core Security issued an advisory Tuesday for what its researchers described as a bug in the software that allowed users to circumvent various security measures in Windows. According to Core Security, there is a vulnerability in the memory management of the Virtual Machine Monitor that makes memory pages mapped above the 2GB available with read or read/write access to user-space programs running in a Guest operating system.

By leveraging this vulnerability it is possible to bypass security mechanisms such as Data Execution Prevention (DEP), Safe Structured Error Handling (SafeSEH) and Address Space Layout Randomization (ASLR), according to the Core Security advisory.

In a blog post, Microsoft’s Paul Cooke, director in the Windows Client group, contested Core Security’s declaration of the situation as a vulnerability. “The functionality that Core calls out is not an actual vulnerability per se,” Cooke wrote. “Instead, they are describing a way for an attacker to more easily exploit security vulnerabilities that must already be present on the system. It’s a subtle point, but one that folks should really understand. The protection mechanisms that are present in the Windows kernel are rendered less effective inside of a virtual machine as opposed to a physical machine. There is no vulnerability introduced, just a loss of certain security protection mechanisms.”

The bug impacts a number of versions of the product, including Microsoft Virtual PC 2007, Virtual PC 2007 SP1, Windows Virtual PC and Microsoft Virtual Server 2005. Because Microsoft’s Virtual PC hypervisor is a component of Windows 7 XP Mode, it is impacted as well. “We believe that Windows XP Mode and Windows Virtual PC are great bridging strategies to help customers who have legacy applications get up and running on Windows 7,” Cooke blogged. “For those customers who need

Windows XP Mode, they should look to install only the required subset of applications that need Windows XP in order to function properly while planning to move those applications to Windows 7 in the future.”

Microsoft’s Hyper-V technology is not affected.

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Share
Published by
Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

Northvolt Mulls US Bankruptcy Protection – Report

Troubled battery maker Northvolt reportedly considers Chapter 11 bankruptcy protection in the United States as…

15 hours ago

FTC Plans Investigation Into Microsoft Cloud Business – Report

Microsoft's cloud business practices are reportedly facing a potential anti-competitive investigation by the FTC

17 hours ago

Programmer Sentenced To Five Years In Prison For Bitcoin Laundering

Ilya Lichtenstein sentenced to five years in prison for hacking into a virtual currency exchange…

19 hours ago

Hate Speech Watchdog CCDH To Quit Musk’s X

Target for Elon Musk's lawsuit, hate speech watchdog CCDH, announces its decision to quit X…

1 day ago

Meta Fined €798m Over Alleged Facebook Marketplace Violations

Antitrust penalty. European Commission fines Meta a hefty €798m ($843m) for tying Facebook Marketplace to…

2 days ago

Elon Musk Rebuked By Italian President Over Migration Tweets

Elon Musk continues to provoke the ire of various leaders around the world with his…

2 days ago