Bugtraq mailing list archives
Re: VMWare poor guest isolation design
From: Tim Newsham <newsham () lava net>
Date: Fri, 24 Aug 2007 11:07:08 -1000 (HST)
VMware's scripting API allows a malicious script on the host machine to execute programs, open URLs, and perform other privileged operations on any guest operating system open at the console, without requiring any credentials on the guest operating system. Furthermore, the script can execute programs even if you lock the desktop of the guest OS.
As opposed to pausing the VM, editing the virtual memory image and unpausing the VM? No scripting interface is needed. How about editing the virtual disk image and replacing one of the cron scripts with a shell-on-a-port? Rebooting the VM and going single user? If you control the VMware process, you control the guest. Fully and Completely.
Mark Burnett http://xato.net
Tim Newsham http://www.thenewsh.com/~newsham/
Current thread:
- RE: More on VMWare poor guest isolation design, (continued)
- RE: More on VMWare poor guest isolation design M. Burnett (Aug 27)
- RE: More on VMWare poor guest isolation design Tim Newsham (Aug 30)
- RE: More on VMWare poor guest isolation design Arthur Corliss (Aug 30)
- Re: More on VMWare poor guest isolation design Wietse Venema (Aug 27)
- Re: VMWare poor guest isolation design Matt Richard (Aug 24)
- Re: VMWare poor guest isolation design Arthur Corliss (Aug 24)
- RE: VMWare poor guest isolation design Ken Kousky (Aug 25)
- RE: VMWare poor guest isolation design Arthur Corliss (Aug 25)
- RE: VMWare poor guest isolation design Ken Kousky (Aug 27)
- RE: VMWare poor guest isolation design Arthur Corliss (Aug 30)