BugTraq
VMWare poor guest isolation design Aug 23 2007 03:22AM
M. Burnett (mb xato net) (2 replies)
Re: VMWare poor guest isolation design Aug 24 2007 09:07PM
Tim Newsham (newsham lava net)
Re: VMWare poor guest isolation design Aug 23 2007 04:49PM
Arthur Corliss (corliss digitalmages com) (6 replies)
RE: VMWare poor guest isolation design Aug 24 2007 06:42PM
Ken Kousky (kkousky ip3inc com)
Re: VMWare poor guest isolation design Aug 24 2007 02:43PM
Matt Richard (matt richard gmail com)
Re: VMWare poor guest isolation design Aug 24 2007 01:06AM
Jonathan Yu (jonathan i yu gmail com) (1 replies)
Re: VMWare poor guest isolation design Aug 24 2007 08:13AM
Arthur Corliss (corliss digitalmages com) (2 replies)
More on VMWare poor guest isolation design Aug 25 2007 01:29AM
M. Burnett (mb xato net) (2 replies)
Re: More on VMWare poor guest isolation design Aug 27 2007 02:37PM
wietse porcupine org (Wietse Venema)
Re: More on VMWare poor guest isolation design Aug 25 2007 07:05PM
Tim Newsham (newsham lava net) (1 replies)
RE: More on VMWare poor guest isolation design Aug 27 2007 05:51PM
M. Burnett (mb xato net) (2 replies)
RE: More on VMWare poor guest isolation design Aug 28 2007 06:49AM
Arthur Corliss (corliss digitalmages com)
RE: More on VMWare poor guest isolation design Aug 27 2007 11:36PM
Tim Newsham (newsham lava net)
Re: VMWare poor guest isolation design Aug 24 2007 01:51PM
Jonathan Yu (jonathan i yu gmail com)
RE: VMWare poor guest isolation design Aug 23 2007 10:40PM
James C. Slora Jr. (james slora phra com)
M. Burnett brings up an important point - there is a lot of
VM-as-panacea promotion going on, and implementers need to put some more
thought into how VMs really fit in to the least privilege model.

Another real-world scenario where this is directly relevant is for
teleworkers.

Some companies provide VMs to remote users thinking that they provide a
secure way for people to connect to a the trusted network from an
untrusted computer. They try to use the VM as virtual security when they
cannot provide physical security and can't verify host integrity. Not
that this is a good idea but it is a commonly promoted practice.

In this scenario the VMX config file could be controlled or redirected
by someone who has control of the untrusted system, so the posted fix
doesn't provide much help. Same goes for the web surfing low privilege
admin PC at work that also edits trusted VMs.

It makes sense to add the posted config line to reduce stupid attack
vectors in common implementations. But the more important underlying
implementation vulnerability is that the trusted vmdk and its vmx should
not be directly accessible from a computer that is not fully trusted, or
under a login that cannot be trusted. So that means you can't host or
edit a VM on your Windows web surfing machine without risking the VM's
integrity. And it means that VMWare Player provides no real protection
either for the VM.

A high-trust VM should only be edited through high-trust hosts, and
should only be accessible through its own properly secured network
services. So the least-privilege user should not have access to the vmdk
or vmx. It might make more sense to use an isolated VM as the less
trustworthy web surfing machine instead of using the web machine to edit
and host the trusted VM.

[ reply ]
RE: VMWare poor guest isolation design Aug 23 2007 08:46PM
William Holmberg (wholmberg amdpi com) (1 replies)
RE: VMWare poor guest isolation design Aug 24 2007 07:16AM
Arthur Corliss (corliss digitalmages com)
RE: VMWare poor guest isolation design Aug 23 2007 08:30PM
M. Burnett (mb xato net) (1 replies)
RE: VMWare poor guest isolation design Aug 24 2007 07:50AM
Arthur Corliss (corliss digitalmages com)


 

Privacy Statement
Copyright 2010, SecurityFocus