Re: VMWare poor guest isolation design

看板Bugtraq作者時間18年前 (2007/08/25 18:56), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串3/8 (看更多)
On Fri, 24 Aug 2007, Matt Richard wrote: > There are other methods of compromising guests without any > requirements for API's, GUI's, etc - > http://www.mnin.org/write/2006_vmshell_injection.pdf. Let me preface my response with the admission that my primary virtualization platform is IBM pSeries, I'm not a big fan of Vmware. Even so, this represents, just like the API attack, a unidirectional attack vector, from the host OS to the guest. I simply don't understand why people are making a big deal about these things. If you don't have a secure host platform then you can't have *any* reasonable expectations of security in the guest to begin with. Now, if someone can prove an attack from one guest to another, or verify if two UIDs running vms can tamper with the other's vm, then there would be a security concern. Devoid of that, techniques like this are just one of a million reasons why no one makes reservations at the Bates Hotel. To expect otherwise makes you deserving of getting stabbed in the shower. --Arthur Corliss Live Free or Die
文章代碼(AID): #16q0hC00 (Bugtraq)
討論串 (同標題文章)
文章代碼(AID): #16q0hC00 (Bugtraq)