1. Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

US-CERT warns of guest-to-host VM escape vulnerability

Discussion in 'Networking & Security' started by remixedcat, Jun 14, 2012.

  1. remixedcat

    remixedcat

    Joined:
    May 13, 2010
    Messages:
    2,806 (1.76/day)
    Thanks Received:
    603
    Summary: The vulnerability affects 64-bit operating systems and virtualization software running on Intel CPU hardware.


    The U.S. Computer Emergency Readiness Team (CERT) has issued an alert for a dangerous guest-to-host virtual machine escape vulnerability affecting virtualization software from multiple vendors.

    The vulnerability, which affects 64-bit operating systems and virtualization software running on Intel CPU hardware, exposes users to local privilege escalation attack or a guest-to-host virtual machine escape.

    From the advisory:

    A ring3 attacker may be able to specifically craft a stack frame to be executed by ring0 (kernel) after a general protection exception (#GP). The fault will be handled before the stack switch, which means the exception handler will be run at ring0 with an attacker’s chosen RSP causing a privilege escalation.

    Affected vendors include Intel Corp., FreeBSD, Microsoft, NetBSD, Oracle, RedHat, SUSE Linux and Xen.

    The US-CERT advisory contains a full list of affected software and links to vendor-supplied patches.
    VMWare says its products are not affected by this issue.
     

Currently Active Users Viewing This Thread: 1 (0 members and 1 guest)

Share This Page