back to article VMware confirms ESX source code had been stolen and published

VMware has confirmed that software posted online is part of the source code for its ESX hypervisor and has warned that more code could be released. The code was posted by a hacker calling himself Hardcore Charlie and may come from military contractor China National Import & Export Corp (CEIEC), which he claimed to have …

COMMENTS

This topic is closed for new posts.
  1. Anonymous Coward
    Anonymous Coward

    I can only hope that the theft & leak of the code will enable someone to create an more polished version of the pigs ear that is the vSphere client.

    Anon because for me, virtualisation is where the beer tokens come from.

    1. Anonymous Coward
      Anonymous Coward

      s/an m/a m/

  2. Hardcastle the ancient
    Coat

    No problem?

    But surely there is a copyright notice at the top?

    So no-one can make use of it, right?

    1. Anonymous Coward
      Anonymous Coward

      Re: No problem?

      Of course... and a year from now when an obscure Chinese software comes out with their own "new" hypervisor I'm sure they will at least have removed the "Copyright VmWare All Rights Reserved" ; )

  3. James O'Brien
    Facepalm

    "The CEIEC has denied that its servers were breached."

    Well of course they would. The Chinese servers dont get hacked, the Chinese only hack other countries servers.

    1. Anonymous Coward
      Anonymous Coward

      Re: "The CEIEC has denied that its servers were breached."

      If the source being released contains highly confidential and proprietary codes, I'm surprised they were accessing from the net at all.

      More likely, a yellow skinned man walked right up to the head developer's desk and took out the master code and walked out at 3am in the morning.

      Syndicate. It's becoming reality.

  4. Anonymous Coward
    Anonymous Coward

    Less secure??

    Surely the publication of the VMware source code will mean that security researchers are more likely to find the holes, report them to VMware, and get them patched?

    1. Anonymous Coward
      Anonymous Coward

      Re: Less secure??

      Depends whos faster off the mark, my bets on the crooks.

    2. This post has been deleted by its author

    3. Dave's Jubblies
      Facepalm

      Re: Less secure??

      @AC above...

      yep... cos that's how it works....

  5. Anonymous Coward
    Flame

    Yes, A Securities Problem

    I guess they fear their stock price will tank when the steaming pile of commercialware code is show the light.

  6. b166er

    Cheaper virtualisation inbound.

    1. Anonymous Coward
      Anonymous Coward

      Why ?

      There are already Xen, KVM and some more open source VMs.

      1. Anonymous Coward
        Anonymous Coward

        Re: Why ?

        Yawn ... bored now ...

  7. Anonymous Coward
    Anonymous Coward

    Old code if it dates back to 2003. Nothing exciting to see here.

  8. Anonymous Coward
    Anonymous Coward

    An excerpt of the stolen code

    Since when does "code" look like a directory listing?

    What kind of new fangled language is this?

    1. andy mcandy
      Linux

      Re: An excerpt of the stolen code

      at a guess, because its the source code build files (not a coder, excuse my terminology) in the screenshot and not the actual line by line code itself.

      regardless, according to the article its ESX which is based on *shhh dont tell anyone* redhat linux.

      ESXi is the significantly better and more recent hypervisor from vmware which pretty much eliminates all the attack vectors exposed in the previous ESX/redhat OS.

      everyone has upgraded their infrastructure to ESXi by now, havent they? ;-)

This topic is closed for new posts.

Other stories you might like