VENOM vulnerability also known as QEMU exploit is the most recent vulnerability reported on May 13, 2015 and it is discovered by Jason Geffner while performing a security review of virtual machine hypervisors. VENOM stands for “Virtualized Environment Neglected Operations Manipulation”. This venom exploits QEMU, an open source machine emulator. The venom CVE-2015-3456 vulnerability resides in the virtual floppy drive code (FDC) used by the virtualization platforms. If it gets exploited, it allows an attacker to gain full control of the operating system hosting them and as well as on …
Monthly Archives
May 2015
Round Robin is a balancing mechanism used by the DNS servers which are usually used for sharing the network load and managing the load of geographically distributed Web servers. The DNS server that uses the round-robin mechanism will provide alternates for each client request. Concept:- Suppose, you have a domain name and three identical home pages hosted on three servers with three different IP addresses. By using Round Robin DNS, when one user accesses the home page, the request will be sent to the first IP address. The second user who …