Until recently, a vulnerability in Amazon Web Services
including the EC2 cloud allowed unauthorised users to perform administrative tasks. At an ACM workshop on cloud security, a team of researchers from Germany's Ruhr University of Bochum led by professor Jörg Schwenk reported that attackers were, for example, able to start and stop virtual machines, and create new images and gateways, in an EC2
instance.
Diff for Researchers find holes in the cloud
Tue, 10/25/2011 - 14:44 by dschur | Tue, 10/25/2011 - 14:46 by dschur | ||
---|---|---|---|
< previous diff | |||
Changes to Body | |||
- | Until recently, a vulnerability in <a rel="external" href="http://aws.amazon.com/" target="_blank">Amazon Web Services</a>
| + | Until recently, a vulnerability in <a rel="external" href="http://aws.amazon.com/" target="_blank">Amazon Web Services
|
- | including the <a rel="external" href="http://aws.amazon.com/ec2/" target="_blank">EC2</a> cloud allowed unauthorised users to perform
| + | including the <a rel="external" href="http://aws.amazon.com/ec2/" target="_blank">EC2 cloud allowed unauthorised users to perform administrative tasks. At an <a rel="external" href="http://crypto.cs.stonybrook.edu/ccsw11/" target="_blank">ACM workshop</a> on cloud security, a team of researchers from Germany's Ruhr University of Bochum led by professor Jörg Schwenk <a rel="external" href="http://idw-online.de/pages/en/news447281" target="_blank">reported<img class="icon" src="http://www.h-online.com/imgs/43/6/2/7/1/5/8/Germany_Flag_Icon-d68b037a35fb984d.png" alt="German language link" title="German language link" width="16" height="13" /> that attackers were, for example, able to start and stop virtual machines, and create new images and gateways, in an EC2
|
- | administrative tasks. At an <a rel="external" href="http://crypto.cs.stonybrook.edu/ccsw11/" target="_blank">ACM workshop</a> on cloud security, a team of researchers from Germany's
| + | |
- | Ruhr University of Bochum led by professor Jörg Schwenk <a rel="external" href="http://idw-online.de/pages/en/news447281" target="_blank">reported</a><img class="icon" src="http://www.h-online.com/imgs/43/6/2/7/1/5/8/Germany_Flag_Icon-d68b037a35fb984d.png" alt="German language link" title="German language link" width="16" height="13" /> that attackers were, for example, able to start
| + | |
- | and stop virtual machines, and create new images and gateways, in an EC2
| + | |
instance.
| instance.
| ||
Current revision: