Risk
6/13/2012
11:36 AM
50%
50%

New Virtualization Vulnerability Allows Escape To Hypervisor Attacks

Local privilege escalation vulnerability affects multiple virtualization products on Xen platform, would allow attacker to run arbitrary code or access any account, warns US-CERT.

A newly disclosed vulnerability that affects multiple virtualization products could allow an attacker to obtain administrative-level rights in the hypervisor and run arbitrary code or access any account of their choosing.

That warning arrived Tuesday in the form of a security advisory released by the U.S. Computer Emergency Readiness Team (US-CERT). "Some 64-bit operating systems and virtualization software running on Intel CPU hardware are vulnerable to a local privilege escalation attack," it read. "The vulnerability may be exploited for local privilege escalation or a guest-to-host virtual machine escape."

"All systems running 64-bit Xen hypervisor running 64-bit PV [para-virtualized] guests on Intel CPUs are vulnerable to this issue," read a security advisory released by the open source Xen project.

[ A flaw in the popular--and free--MySQL and MariaDB databases leaves them open to brute-force attacks. Read more at MySQL Database Flaw Leaves Passwords Vulnerable. ]

Metasploit penetration testing framework founder, developer, and researcher H.D. Moore characterized the bug as a "serious guest-to-host escape vulnerability," noting that while it affects the Xen platform, it doesn't affect VMware.

The Xen project said it's updated the Xen code base to eliminate the vulnerability. Likewise, multiple vendors and providers of virtualization products, including FreeBSD, Microsoft, NetBSD, Oracle, Red Hat, and SUSE Linux, have released updated software to patch the Xen hypervisor flaw. Apple, Intel, and VMware have confirmed that the vulnerability doesn't exist in their products. Meanwhile, Debian GNU/Linux, Fedora Project, Gentoo Linux, HP, and IBM have yet to confirm whether their software is vulnerable to the escape-to-hypervisor vulnerability.

IBM has warned about the information security threat that "escape-to-hypervisor" attacks can pose, especially as roughly one-third of all virtualization bugs discovered by 2010 were in the hypervisor. Since virtualized environments run multiple instances of operating systems, an attacker that escaped from any one of those instances and gained administrative-level rights could then access any other virtualized environment running on the same server.

The security bulletins released in the wake of the Xen flaw announcements read along similar lines. "An unprivileged user in a 64-bit para-virtualized guest, that is running on a 64-bit host that has an Intel CPU, could use this flaw to crash the host or potentially escalate their privileges, allowing them to execute arbitrary code at the hypervisor level," read the related Red Hat security bulletin, which noted that the flaw affects the Xen hypervisor implementation as shipped with Red Hat Enterprise Linux 5.

According to Microsoft, the Xen flaw is present in its Windows User Mode Scheduler. "An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights," read Microsoft's related security bulletin. It said that Intel x64-based versions of Windows 7 and Windows Server 2008 R2 are affected by the flaw, as are Windows XP SP3 and Server 2003 SP2.

But there are mitigating factors. "An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability," said Microsoft. "The vulnerability could not be exploited remotely or by anonymous users." This means that--as noted by US-CERT--this is a "local privilege escalation" vulnerability.

According to Xen, another mitigation technique is to run the hypervisor in hardware-assisted virtualization mode, or to use 32-bit para-virtualization.

Both Microsoft and Red Hat rate the related hypervisor vulnerability in their products not "serious" but just "important," owing to the fact that an attacker must possess valid login credentials before executing the attack, or, in the case of Red Hat Linux guests, must possess at least "privileged guest user" status.

Credit for spotting the vulnerability goes to kernel and virtualization security researcher Rafal Wojtczuk of Bromium, who alerted the Xen project.

On a related note, Wojtczuk is scheduled to present a session at next month's Black Hat (BH) conference in Las Vegas on the topic of exploiting "user-to-kernel privilege escalation" bugs in four Intel-CPU-based operating systems--not including Linux. He's described the vulnerabilities involved as being "widespread and reliably exploitable."

"The BH talk will be precisely about the vulnerability that vendors released patches for yesterday," said Wojtczuk via email. "So naturally by BH time, this will not be a zero-day issue."

Black Hat USA Las Vegas, the premiere conference on information security, features four days of deep technical training followed by two days of presentations from speakers discussing their latest research around a broad range of security topics. At Caesars Palace in Las Vegas, July 21-26. Register today.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2009-5027
Published: 2014-12-26
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-2062. Reason: This candidate is a reservation duplicate of CVE-2010-2062. Notes: All CVE users should reference CVE-2010-2062 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

CVE-2010-1441
Published: 2014-12-26
Multiple heap-based buffer overflows in VideoLAN VLC media player before 1.0.6 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted byte stream to the (1) A/52, (2) DTS, or (3) MPEG Audio decoder.

CVE-2010-1442
Published: 2014-12-26
VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly execute arbitrary code via a crafted byte stream to the (1) AVI, (2) ASF, or (3) Matroska (aka MKV) demuxer.

CVE-2010-1443
Published: 2014-12-26
The parse_track_node function in modules/demux/playlist/xspf.c in the XSPF playlist parser in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty location element in an XML Shareable Playlist Format...

CVE-2010-1444
Published: 2014-12-26
The ZIP archive decompressor in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly execute arbitrary code via a crafted archive.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.