zlacker

[parent] [thread] 3 comments
1. Syonyk+(OP)[view] [source] 2023-07-11 19:35:22
The problem is that containers rely on the OS kernel to enforce separation, and kernel exploits are an awful lot less rare than anyone would prefer.

If someone is delivering targeted malware to a company through HR channels, it's safe to assume that if they can escape the document viewer, they can probably also try for a local root/kernel exploit and escape the container.

Containers are separation of convenience - not a hard security boundary.

replies(1): >>davida+M8
2. davida+M8[view] [source] 2023-07-11 20:23:44
>>Syonyk+(OP)
And container escape exploits are getting burned by sending them out via email? Doubtful.
replies(2): >>Syonyk+Tb >>adgjls+h41
◧◩
3. Syonyk+Tb[view] [source] [discussion] 2023-07-11 20:41:07
>>davida+M8
It depends on who you're targeting and what you want.

But the history of computers security can largely be summed as:

"What? You're just paranoid. Nobody would possibly X!"

Someone gets their asses handed to them by someone Xing.

"What? Why didn't you tell us X was a risk we needed to be concerned about???"

Iterate.

◧◩
4. adgjls+h41[view] [source] [discussion] 2023-07-12 03:55:56
>>davida+M8
well if you bother to send an email that breaks out of the container, you might as well make it retrospectively delete the email to hide the evidence :)
[go to top]