Series of vulnerabilities in virtualization systems

Posted: June 24, 2013 in Security Notices, Vulnerability News
Tags: , , ,

Vulnerabilities in Xen

Vulnerabilities in Xen

Vulnerabilities in Xen allowing from a guest environment to get access to a host system

In the components of virtualization based on the Xen hypervisor revealed a series of security vulnerabilities. An integer overflow (CVE-2013-2194) in the parser ELF format, used to load the cores for guest systems can be used for the organization of the code on the host system.

The problem occurs only when the guest system operating mode paravirtulizatsii (PV) has the power to indicate a custom kernel. System in which the use of nuclear specified by the host system, the issue does not occur.

The second vulnerability is caused by an error checking access rights to the console in the library libxl (libxenlight), allowing you to organize the attack, which may result in access to the contents of files on the host system from the guest environment. Access can be arranged to read and write, but with the rights of the user under which the application runs xenconsole (it is likely that the program will be launched xenconsole administrator will connect to one of the guest systems). For guest systems in HVM except files an attacker to take control of network resources in the model hierarchy devices QEMU, for example, to perform a redirect VNC-port console to another port to bypass the blocking firewall.

Link:

http://www.openwall.com/lists/oss-security/2013/06/20/4

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s