BugTraq
VMWare poor guest isolation design Aug 23 2007 03:22AM
M. Burnett (mb xato net) (2 replies)
Re: VMWare poor guest isolation design Aug 24 2007 09:07PM
Tim Newsham (newsham lava net)
Re: VMWare poor guest isolation design Aug 23 2007 04:49PM
Arthur Corliss (corliss digitalmages com) (6 replies)
RE: VMWare poor guest isolation design Aug 24 2007 06:42PM
Ken Kousky (kkousky ip3inc com)
Re: VMWare poor guest isolation design Aug 24 2007 02:43PM
Matt Richard (matt richard gmail com)
Re: VMWare poor guest isolation design Aug 24 2007 01:06AM
Jonathan Yu (jonathan i yu gmail com) (1 replies)
Re: VMWare poor guest isolation design Aug 24 2007 08:13AM
Arthur Corliss (corliss digitalmages com) (2 replies)
More on VMWare poor guest isolation design Aug 25 2007 01:29AM
M. Burnett (mb xato net) (2 replies)
Re: More on VMWare poor guest isolation design Aug 27 2007 02:37PM
wietse porcupine org (Wietse Venema)
Re: More on VMWare poor guest isolation design Aug 25 2007 07:05PM
Tim Newsham (newsham lava net) (1 replies)
RE: More on VMWare poor guest isolation design Aug 27 2007 05:51PM
M. Burnett (mb xato net) (2 replies)
RE: More on VMWare poor guest isolation design Aug 28 2007 06:49AM
Arthur Corliss (corliss digitalmages com)
RE: More on VMWare poor guest isolation design Aug 27 2007 11:36PM
Tim Newsham (newsham lava net)
Re: VMWare poor guest isolation design Aug 24 2007 01:51PM
Jonathan Yu (jonathan i yu gmail com)
On 8/24/07, Arthur Corliss <corliss (at) digitalmages (dot) com [email concealed]> wrote:
> On Thu, 23 Aug 2007, Jonathan Yu wrote:
>
> > Hi there,
> >
> > First of all - please forgive me, I'm not a developer and I don't use
> > the automation API. However, I use VMware a lot for development. I
> > have a Windows XP host machine and I use VMware to develop Linux code
> > (Debian Etch, Linux 2.6).
>
> I'm a p570 user on the server side, but I do use vmware workstation for
> development purposes as well.
>
> > It is worse than this because according to the original e-mail, you
> > can queue up commands to be executed upon the next login. That is
> > where it gets dangerous, whereas it wouldn't have been an issue with
> > "no physical security" alone.
>
> Only if you *choose* to run the userland utilities. If you don't, all the
> queuing in the world won't get those commands executed.
>
> > However, I propose an alternate attack scenario: if the host system is
> > compromised, then the program is able to write to the VMware Disk
> > files or the physical partition that the virtual machines are
> > installed in. This means that you can write arbitrary things to it or
> > change files around, so you can have the same effect if you, say, add
> > a command to the root user's crontab...
>
> Which is my point. If you don't have security on the host, you're already
> massively vulnerable regardless of whether or not this functionality exists.
>
> >> Furthermore, this attack only works if you are running the vmware guest
> >> utilities *and* you are currently logged into a GUI desktop running the
> >> vmware userland process.
> > Many people are in this situation.
>
> So we're surrounded by lemmings. You're not pinning that on me, man. ;-)
>
> > I have all the guest tools installed. Why? It is useful - besides the
> > hgfs ("Shared Folders") support, there is also the vmmemctl module,
> > which returns unused memory pages back to the host OS, which allows
> > overcommitting if necessary (on my system it just ensures that I can
> > use as much of the RAM as possible).
>
> I'm glad you're getting some utility from them, you're part of the
> demographic they wrote them for. But, odds are, you're also part of the
> demographic that still doesn't have practical impact by this. You probably
> admin your own box as well as the vms you develop in. If your host has
> gotten exploited, whether or not they can execute something in a vm is the
> least of your problems. Once again, host security rules all.
Agreed. And this is the important part. Even if people are using an
"enterprise-class" solution such as OpenVZ (which shares a Linux
kernel with many virtual environments) or the VMware ESX Server
(which, if I recall correctly, runs its own operating system on the
host machine).
>
> Let's sum this up, folks: this functionality poses no threat to the host
> platform. So, if someone cracks the *host* isn't that fact alone far more
> frightening than the ability to (maybe) launch a few processes in a vm? I'd
> wager that the damage that can be done by launching a few processes on the
> host is far more gruesome than what can be done in the guests.
>
> --Arthur Corliss
> Live Free or Die
>

[ reply ]
RE: VMWare poor guest isolation design Aug 23 2007 10:40PM
James C. Slora Jr. (james slora phra com)
RE: VMWare poor guest isolation design Aug 23 2007 08:46PM
William Holmberg (wholmberg amdpi com) (1 replies)
RE: VMWare poor guest isolation design Aug 24 2007 07:16AM
Arthur Corliss (corliss digitalmages com)
RE: VMWare poor guest isolation design Aug 23 2007 08:30PM
M. Burnett (mb xato net) (1 replies)
RE: VMWare poor guest isolation design Aug 24 2007 07:50AM
Arthur Corliss (corliss digitalmages com)


 

Privacy Statement
Copyright 2010, SecurityFocus