Jeff Campbell
04-21-2009, 04:00 PM
<div class='os_post_top_link'><a href='http://theappleblog.com/2009/04/16/macs-open-to-security-flaw-thanks-to-windows-in-vmware-fusion/' target='_blank'>http://theappleblog.com/2009/04/16/...-vmware-fusion/</a><br /><br /></div><p><em>"The recent Conficker virus scare had me warning relatives to protect their PCs, while also simultaneously gloating about how lucky I am to not be affected, since I'm a Mac user. You could say it bordered on the obnoxious, and you'd be right. But it looks like I may have to eat some humble pie now that a bug has been found in VMware Fusion that could potentially allow malicious code to be run on your Mac using a virtualized Windows machine as a conduit. Obviously, Windows is still the weak link here, but it doesn't make your Apple machine any less vulnerable."</em></p><p><em><img src="http://images.thoughtsmedia.com/resizer/thumbs/size/600/at/auto/1240258915.usr105634.jpg" /></em></p><p>This is a good reminder that just because it is a Mac, it doesn't mean that it is safe. Especially if you are running Windows on your machine. The flaw in question was discovered by Immunity Inc. exploit researcher Kostya Kortchinsky, and it allows the virtual machine display function to read and write code in the host operating system.</p><p>According to the article "<em>Kortchinsky demoed the flaw using a Vista machine running a guest OS of Windows XP, but said the flaw is just as easy to exploit in OS X running Fusion, though they hadn't yet actually run live tests of such a scenario." </em>Luckily, VMware is on top of things and have posted a software <a href="http://www.vmware.com/download/fusion/" target="_blank">update</a> to fix the problem.</p><p>The AppleBlog did a <a href="http://theappleblog.com/2008/11/21/4-mac-security-apps-compared/" target="_blank">comparison</a> of four security programs from last fall for the Mac in case you are interested in checking out a few ways to protect your Mac. </p>