【24h】

Assessment of Hypervisor Vulnerabilities

机译:评估虚拟机监控程序漏洞

获取原文

摘要

Hypervisors are the main components for managing virtual machines on cloud computing systems. Thus, the security of hypervisors is very crucial as the whole system could be compromised when just one vulnerability is exploited. In this paper, we assess the vulnerabilities of widely used hypervisors including VMware ESXi, Citrix XenServer and KVM using the NIST 800-115 security testing framework. We perform real experiments to assess the vulnerabilities of those hypervisors using security testing tools. The results are evaluated using weakness information from CWE, and using vulnerability information from CVE. We also compute the severity scores using CVSS information. All vulnerabilities found of three hypervisors will be compared in terms of weaknesses, severity scores and impact. The experimental results showed that ESXi and XenServer have common weaknesses and vulnerabilities whereas KVM has fewer vulnerabilities. In addition, we discover a new vulnerability called HTTP response splitting on ESXi Web interface.
机译:系统管理程序是在云计算系统上管理虚拟机的主要组件。因此,系统管理程序的安全性至关重要,因为仅利用一个漏洞就可能损害整个系统。在本文中,我们使用NIST 800-115安全测试框架评估了包括VMware ESXi,Citrix XenServer和KVM在内的广泛使用的管理程序的漏洞。我们使用安全测试工具执行真实的实验,以评估那些管理程序的漏洞。使用CWE的漏洞信息和CVE的漏洞信息对结果进行评估。我们还使用CVSS信息计算严重性得分。将比较三个虚拟机监控程序发现的所有漏洞的弱点,严重性得分和影响。实验结果表明,ESXi和XenServer具有共同的弱点和漏洞,而KVM具有较少的漏洞。此外,我们在ESXi Web界面上发现了一个名为HTTP响应拆分的新漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号