BugTraq
VMWare poor guest isolation design Aug 23 2007 03:22AM
M. Burnett (mb xato net) (2 replies)
Re: VMWare poor guest isolation design Aug 24 2007 09:07PM
Tim Newsham (newsham lava net)
Re: VMWare poor guest isolation design Aug 23 2007 04:49PM
Arthur Corliss (corliss digitalmages com) (6 replies)
RE: VMWare poor guest isolation design Aug 24 2007 06:42PM
Ken Kousky (kkousky ip3inc com)
Re: VMWare poor guest isolation design Aug 24 2007 02:43PM
Matt Richard (matt richard gmail com)
Re: VMWare poor guest isolation design Aug 24 2007 01:06AM
Jonathan Yu (jonathan i yu gmail com) (1 replies)
Re: VMWare poor guest isolation design Aug 24 2007 08:13AM
Arthur Corliss (corliss digitalmages com) (2 replies)
On Thu, 23 Aug 2007, Jonathan Yu wrote:

> Hi there,
>
> First of all - please forgive me, I'm not a developer and I don't use
> the automation API. However, I use VMware a lot for development. I
> have a Windows XP host machine and I use VMware to develop Linux code
> (Debian Etch, Linux 2.6).

I'm a p570 user on the server side, but I do use vmware workstation for
development purposes as well.

> It is worse than this because according to the original e-mail, you
> can queue up commands to be executed upon the next login. That is
> where it gets dangerous, whereas it wouldn't have been an issue with
> "no physical security" alone.

Only if you *choose* to run the userland utilities. If you don't, all the
queuing in the world won't get those commands executed.

> However, I propose an alternate attack scenario: if the host system is
> compromised, then the program is able to write to the VMware Disk
> files or the physical partition that the virtual machines are
> installed in. This means that you can write arbitrary things to it or
> change files around, so you can have the same effect if you, say, add
> a command to the root user's crontab...

Which is my point. If you don't have security on the host, you're already
massively vulnerable regardless of whether or not this functionality exists.

>> Furthermore, this attack only works if you are running the vmware guest
>> utilities *and* you are currently logged into a GUI desktop running the
>> vmware userland process.
> Many people are in this situation.

So we're surrounded by lemmings. You're not pinning that on me, man. ;-)

> I have all the guest tools installed. Why? It is useful - besides the
> hgfs ("Shared Folders") support, there is also the vmmemctl module,
> which returns unused memory pages back to the host OS, which allows
> overcommitting if necessary (on my system it just ensures that I can
> use as much of the RAM as possible).

I'm glad you're getting some utility from them, you're part of the
demographic they wrote them for. But, odds are, you're also part of the
demographic that still doesn't have practical impact by this. You probably
admin your own box as well as the vms you develop in. If your host has
gotten exploited, whether or not they can execute something in a vm is the
least of your problems. Once again, host security rules all.

Let's sum this up, folks: this functionality poses no threat to the host
platform. So, if someone cracks the *host* isn't that fact alone far more
frightening than the ability to (maybe) launch a few processes in a vm? I'd
wager that the damage that can be done by launching a few processes on the
host is far more gruesome than what can be done in the guests.

--Arthur Corliss
Live Free or Die

[ reply ]
More on VMWare poor guest isolation design Aug 25 2007 01:29AM
M. Burnett (mb xato net) (2 replies)
Re: More on VMWare poor guest isolation design Aug 27 2007 02:37PM
wietse porcupine org (Wietse Venema)
Re: More on VMWare poor guest isolation design Aug 25 2007 07:05PM
Tim Newsham (newsham lava net) (1 replies)
RE: More on VMWare poor guest isolation design Aug 27 2007 05:51PM
M. Burnett (mb xato net) (2 replies)
RE: More on VMWare poor guest isolation design Aug 28 2007 06:49AM
Arthur Corliss (corliss digitalmages com)
RE: More on VMWare poor guest isolation design Aug 27 2007 11:36PM
Tim Newsham (newsham lava net)
Re: VMWare poor guest isolation design Aug 24 2007 01:51PM
Jonathan Yu (jonathan i yu gmail com)
RE: VMWare poor guest isolation design Aug 23 2007 10:40PM
James C. Slora Jr. (james slora phra com)
RE: VMWare poor guest isolation design Aug 23 2007 08:46PM
William Holmberg (wholmberg amdpi com) (1 replies)
RE: VMWare poor guest isolation design Aug 24 2007 07:16AM
Arthur Corliss (corliss digitalmages com)
RE: VMWare poor guest isolation design Aug 23 2007 08:30PM
M. Burnett (mb xato net) (1 replies)
RE: VMWare poor guest isolation design Aug 24 2007 07:50AM
Arthur Corliss (corliss digitalmages com)


 

Privacy Statement
Copyright 2010, SecurityFocus