Until recently, a vulnerability in Amazon Web Services
including the EC2 cloud allowed unauthorised users to perform
administrative tasks. At an ACM workshop on cloud security, a team of researchers from Germany's
Ruhr University of Bochum led by professor Jörg Schwenk reported that attackers were, for example, able to start
and stop virtual machines, and create new images and gateways, in an EC2
instance.
Diff for Researchers find holes in the cloud
Tue, 10/25/2011 - 14:05 by dschur | Tue, 10/25/2011 - 14:44 by dschur | ||
---|---|---|---|
< previous diff | next diff > | ||
Changes to Body | |||
Until recently, a vulnerability in <a rel="external" href="http://aws.amazon.com/" target="_blank">Amazon Web Services</a>
| Until recently, a vulnerability in <a rel="external" href="http://aws.amazon.com/" target="_blank">Amazon Web Services</a>
| ||
including the <a rel="external" href="http://aws.amazon.com/ec2/" target="_blank">EC2</a> cloud allowed unauthorised users to perform
| including the <a rel="external" href="http://aws.amazon.com/ec2/" target="_blank">EC2</a> cloud allowed unauthorised users to perform
| ||
- | administrative tasks. At an <a rel="external" href="http://crypto.cs.stonybrook.edu/ccsw11/" target="_blank">ACM
| + | administrative tasks. At an <a rel="external" href="http://crypto.cs.stonybrook.edu/ccsw11/" target="_blank">ACM workshop</a> on cloud security, a team of researchers from Germany's
|
- | workshop</a> on cloud security, a team of researchers from Germany's
| + | |
Ruhr University of Bochum led by professor Jörg Schwenk <a rel="external" href="http://idw-online.de/pages/en/news447281" target="_blank">reported</a><img class="icon" src="http://www.h-online.com/imgs/43/6/2/7/1/5/8/Germany_Flag_Icon-d68b037a35fb984d.png" alt="German language link" title="German language link" width="16" height="13" /> that attackers were, for example, able to start
| Ruhr University of Bochum led by professor Jörg Schwenk <a rel="external" href="http://idw-online.de/pages/en/news447281" target="_blank">reported</a><img class="icon" src="http://www.h-online.com/imgs/43/6/2/7/1/5/8/Germany_Flag_Icon-d68b037a35fb984d.png" alt="German language link" title="German language link" width="16" height="13" /> that attackers were, for example, able to start
| ||
and stop virtual machines, and create new images and gateways, in an EC2
| and stop virtual machines, and create new images and gateways, in an EC2
| ||
instance.
| instance.
| ||
Revision of Tue, 10/25/2011 - 14:44: