Bugtraq mailing list archives

Re: VMWare poor guest isolation design


From: "Matt Richard" <matt.richard () gmail com>
Date: Fri, 24 Aug 2007 10:43:34 -0400

On 8/23/07, Arthur Corliss <corliss () digitalmages com> wrote:
On Wed, 22 Aug 2007, M. Burnett wrote:

I have run across a design issue in VMware's scripting automation API that
diminishes VM guest/host isolation in such a manner to facilitate privilege
escalation, spreading of malware, and compromise of guest operating systems.


Furthermore, this attack only works if you are running the vmware guest
utilities *and* you are currently logged into a GUI desktop running the
vmware userland process.

In (not so) short, this attack vector is virtually worthless if reasonable
security practices are employed.

There are other methods of compromising guests without any
requirements for API's, GUI's, etc -
http://www.mnin.org/write/2006_vmshell_injection.pdf.

-- 
Matt Richard


Current thread: