lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.BSI.4.64.0708241104410.11671@malasada.lava.net>
Date: Fri, 24 Aug 2007 11:07:08 -1000 (HST)
From: Tim Newsham <newsham@...a.net>
To: "M. Burnett" <mb@...o.net>
Cc: bugtraq@...urityfocus.com
Subject: Re: VMWare poor guest isolation design

> VMware's scripting API allows a malicious script on the host machine to
> execute programs, open URLs, and perform other privileged operations on any
> guest operating system open at the console, without requiring any
> credentials on the guest operating system. Furthermore, the script can
> execute programs even if you lock the desktop of the guest OS.

As opposed to pausing the VM, editing the virtual memory image and 
unpausing the VM?  No scripting interface is needed.  How about editing 
the virtual disk image and replacing one of the cron scripts with a 
shell-on-a-port?  Rebooting the VM and going single user?  If you control 
the VMware process, you control the guest.  Fully and Completely.

> Mark Burnett
> http://xato.net

Tim Newsham
http://www.thenewsh.com/~newsham/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ