David Bombal

#555: VirtualBox VM Escape: Integer Overflow Explained Clearly

Mar 10, 2026
Vladimir Tokarev, a vulnerability researcher known for exploit development and AI-assisted security work. He walks through a Gemini CLI VSIX command-injection demo and a VirtualBox integer overflow that can enable VM-to-host memory corruption. He also outlines a practical workflow using static analysis plus LLM triage to find and validate real bugs.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

Gemini CLI VSIX Filename Command Injection

  • Vladimir demoed a Gemini CLI command injection that executed a calculator by placing a crafted VSIX filename into the IDE install flow.
  • The attack needs the malicious VSIX in a specific directory or tricking a user into installing it, enabling local code execution when the agent runs the install command.
INSIGHT

32 Bit Check Versus 64 Bit Pointer Mismatch

  • An integer overflow in VirtualBox's VMSVGA rect copy arises from 32-bit bounds checking versus 64-bit pointer arithmetic, letting copies escape the framebuffer.
  • The bug allows both out-of-bounds read and write primitives, enabling memory disclosure then targeted overwrites for host compromise.
INSIGHT

Read Then Write Makes Exploits Practical

  • Having both read and write primitives greatly increases exploitability because memory disclosure enables precise overwrites despite modern mitigations.
  • Vladimir notes ASLR, canaries and CFI make blind overwrites unlikely, so read-first is critical to map targets like libc in heap.
Get the Snipd Podcast app to discover more snips from this episode
Get the app