|
BugTraq
VMWare poor guest isolation design Aug 23 2007 03:22AM M. Burnett (mb xato net) (2 replies) Re: VMWare poor guest isolation design Aug 23 2007 04:49PM Arthur Corliss (corliss digitalmages com) (6 replies) Re: VMWare poor guest isolation design Aug 24 2007 01:06AM Jonathan Yu (jonathan i yu gmail com) (1 replies) Re: VMWare poor guest isolation design Aug 24 2007 08:13AM Arthur Corliss (corliss digitalmages com) (2 replies) More on VMWare poor guest isolation design Aug 25 2007 01:29AM M. Burnett (mb xato net) (2 replies) Re: More on VMWare poor guest isolation design Aug 27 2007 02:37PM wietse porcupine org (Wietse Venema) Re: More on VMWare poor guest isolation design Aug 25 2007 07:05PM Tim Newsham (newsham lava net) (1 replies) RE: More on VMWare poor guest isolation design Aug 27 2007 05:51PM M. Burnett (mb xato net) (2 replies) RE: More on VMWare poor guest isolation design Aug 28 2007 06:49AM Arthur Corliss (corliss digitalmages com) RE: VMWare poor guest isolation design Aug 23 2007 10:40PM James C. Slora Jr. (james slora phra com) RE: VMWare poor guest isolation design Aug 23 2007 08:46PM William Holmberg (wholmberg amdpi com) (1 replies) RE: VMWare poor guest isolation design Aug 24 2007 07:16AM Arthur Corliss (corliss digitalmages com) RE: VMWare poor guest isolation design Aug 23 2007 08:30PM M. Burnett (mb xato net) (1 replies) RE: VMWare poor guest isolation design Aug 24 2007 07:50AM Arthur Corliss (corliss digitalmages com) |
|
Privacy Statement |
> host always means owning the guests, but that isn't always the case,
> especially if you are not a full administrator on the host machine.
...
> should be able to protect a virtual guest from its host. There's no way a
> non-admin user is going to be able to modify the RAM of a vm. And in Windows
> Vista, if not already blocked, even as an administrator I would have to
> explicitly allow a worm to access the RAM or disk of a virtual machine. No
> worm is going to access a vm's resources without a UAC prompt coming up.
UAC is not a security boundary.
You don't need administrator privileges. If the VM is running with the
same privileges of the attacker, he can alter the program state of the VM.
The most obvious way with VMWare is to pause the machine. This writes out
physical memory as a .vmem file. Alter the file and resume VMWare. Less
obviously you can use the OS debugging APIs, or inject a DLL into the
address space of the VM process, or map its memory using memory management
APIs, or exploit a vulnerability in the VM process, or.....
Similar attacks can be performed by altering the disks or attaching
malicious hardware. You could point out that the guest OS need not
trust the disk or the hardware and you would be right. However, all
of the important OSs *DO* trust disks and most are very trusting of
hardware.
Your statements that administrator access protects the VM is simply false.
Your assumption that UAC will protect you from low-privileged worms is
similarly wrong.
> Mark
Tim Newsham
http://www.thenewsh.com/~newsham/
[ reply ]