{"id":26004,"date":"2018-11-09T12:18:12","date_gmt":"2018-11-09T12:18:12","guid":{"rendered":"https:\/\/udsenterprise.com\/how-protect-against-zero-day-vulnerability-virtual\/"},"modified":"2024-07-22T13:51:54","modified_gmt":"2024-07-22T13:51:54","slug":"how-protect-against-zero-day-vulnerability-virtual","status":"publish","type":"post","link":"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/","title":{"rendered":"How to protect against zero-day vulnerability in VirtualBox"},"content":{"rendered":"<p>A memory corruption problem affecting the <strong>Intel PRO \/ 1000 MT Desktop network card (82540EM) (E1000) when the network mode is set to NAT<\/strong> is the cause of this vulnerability. It is independent of the operating system of both the host and the virtual machine, so users of any OS could be in danger.<\/p>\n<p>According to Zelenyuk, <strong>all versions of VirtualBox prior to the newly released 5.2 have this security flaw<\/strong>, which is found in the default configuration of all virtual machines. The security expert published <strong>this video<\/strong> in which he explains this vulnerability in detail and how to exploit it.<\/p>\n<p>To protect against possible attacks, it is recommended to <em>update to the new version of VirtualBox<strong> that has been released today. It can be downloaded from the <\/strong><a href=\"https:\/\/www.virtualbox.org\/\" target=\"_blank\" rel=\"noopener nofollow\">official VirtualBox website <\/a><\/em>*.<\/p>\n<p>Source: <strong>Tekcrispy<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researcher Sergey Zelenyuk has discovered a <strong>zero-day vulnerability in VirtualBox<\/strong>, the Open Source virtualization software developed by Oracle. This failure allows malware to leave the virtual machine and <strong>execute malicious code on the host OS<\/strong> that runs the VirtualBox process.<\/p>\n","protected":false},"author":2,"featured_media":11802,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[985,926],"tags":[986,928],"class_list":["post-26004","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hot-news","category-security","tag-hot-news","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to protect against zero-day vulnerability in VirtualBox<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect against zero-day vulnerability in VirtualBox\" \/>\n<meta property=\"og:description\" content=\"Security researcher Sergey Zelenyuk has discovered a zero-day vulnerability in VirtualBox, the Open Source virtualization software developed by Oracle. This failure allows malware to leave the virtual machine and execute malicious code on the host OS that runs the VirtualBox process.\" \/>\n<meta property=\"og:site_name\" content=\"UDS Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-09T12:18:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-22T13:51:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"67\" \/>\n\t<meta property=\"og:image:height\" content=\"4\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"UDS Enterprise Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n<meta name=\"twitter:creator\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:site\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"UDS Enterprise Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/\"},\"author\":{\"name\":\"UDS Enterprise Team\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920\"},\"headline\":\"How to protect against zero-day vulnerability in VirtualBox\",\"datePublished\":\"2018-11-09T12:18:12+00:00\",\"dateModified\":\"2024-07-22T13:51:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/\"},\"wordCount\":138,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/zero-day-vulnerability-virtualbox-oracle.png\",\"keywords\":[\"Hot news\",\"Security\"],\"articleSection\":[\"Hot news\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/\",\"url\":\"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/\",\"name\":\"How to protect against zero-day vulnerability in VirtualBox\",\"isPartOf\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/zero-day-vulnerability-virtualbox-oracle.png\",\"datePublished\":\"2018-11-09T12:18:12+00:00\",\"dateModified\":\"2024-07-22T13:51:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/#primaryimage\",\"url\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/zero-day-vulnerability-virtualbox-oracle.png\",\"contentUrl\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/zero-day-vulnerability-virtualbox-oracle.png\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/udsenterprise.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hot news\",\"item\":\"https:\/\/udsenterprise.com\/en\/category\/hot-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to protect against zero-day vulnerability in VirtualBox\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#website\",\"url\":\"https:\/\/udsenterprise.com\/en\/\",\"name\":\"UDS Enterprise\",\"description\":\"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.\",\"publisher\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/#organization\"},\"alternateName\":\"UDS Enterprise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/udsenterprise.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#organization\",\"name\":\"UDS Enterprise\",\"alternateName\":\"UDS Enterprise\",\"url\":\"https:\/\/udsenterprise.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg\",\"contentUrl\":\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg\",\"width\":300,\"height\":202,\"caption\":\"UDS Enterprise\"},\"image\":{\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/VirtualCable_\",\"https:\/\/es.linkedin.com\/company\/virtualcable\",\"https:\/\/www.youtube.com\/@UDSEnterprise\"],\"description\":\"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920\",\"name\":\"UDS Enterprise Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"caption\":\"UDS Enterprise Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to protect against zero-day vulnerability in VirtualBox","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/","og_locale":"en_US","og_type":"article","og_title":"How to protect against zero-day vulnerability in VirtualBox","og_description":"Security researcher Sergey Zelenyuk has discovered a zero-day vulnerability in VirtualBox, the Open Source virtualization software developed by Oracle. This failure allows malware to leave the virtual machine and execute malicious code on the host OS that runs the VirtualBox process.","og_site_name":"UDS Enterprise","article_published_time":"2018-11-09T12:18:12+00:00","article_modified_time":"2024-07-22T13:51:54+00:00","og_image":[{"width":67,"height":4,"url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","type":"image\/gif"}],"author":"UDS Enterprise Team","twitter_card":"summary_large_image","twitter_image":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","twitter_creator":"@VirtualCable_","twitter_site":"@VirtualCable_","twitter_misc":{"Written by":"UDS Enterprise Team","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/#article","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/"},"author":{"name":"UDS Enterprise Team","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920"},"headline":"How to protect against zero-day vulnerability in VirtualBox","datePublished":"2018-11-09T12:18:12+00:00","dateModified":"2024-07-22T13:51:54+00:00","mainEntityOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/"},"wordCount":138,"commentCount":0,"publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/zero-day-vulnerability-virtualbox-oracle.png","keywords":["Hot news","Security"],"articleSection":["Hot news","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/","url":"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/","name":"How to protect against zero-day vulnerability in VirtualBox","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/#primaryimage"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/zero-day-vulnerability-virtualbox-oracle.png","datePublished":"2018-11-09T12:18:12+00:00","dateModified":"2024-07-22T13:51:54+00:00","breadcrumb":{"@id":"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/#primaryimage","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/zero-day-vulnerability-virtualbox-oracle.png","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/zero-day-vulnerability-virtualbox-oracle.png","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/udsenterprise.com\/en\/how-protect-against-zero-day-vulnerability-virtual\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/udsenterprise.com\/en\/"},{"@type":"ListItem","position":2,"name":"Hot news","item":"https:\/\/udsenterprise.com\/en\/category\/hot-news\/"},{"@type":"ListItem","position":3,"name":"How to protect against zero-day vulnerability in VirtualBox"}]},{"@type":"WebSite","@id":"https:\/\/udsenterprise.com\/en\/#website","url":"https:\/\/udsenterprise.com\/en\/","name":"UDS Enterprise","description":"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.","publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"alternateName":"UDS Enterprise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/udsenterprise.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/udsenterprise.com\/en\/#organization","name":"UDS Enterprise","alternateName":"UDS Enterprise","url":"https:\/\/udsenterprise.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","width":300,"height":202,"caption":"UDS Enterprise"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/VirtualCable_","https:\/\/es.linkedin.com\/company\/virtualcable","https:\/\/www.youtube.com\/@UDSEnterprise"],"description":"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS"},{"@type":"Person","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920","name":"UDS Enterprise Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","caption":"UDS Enterprise Team"}}]}},"_links":{"self":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/26004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/comments?post=26004"}],"version-history":[{"count":3,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/26004\/revisions"}],"predecessor-version":[{"id":32401,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/26004\/revisions\/32401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media\/11802"}],"wp:attachment":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media?parent=26004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/categories?post=26004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/tags?post=26004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}