Virtual machine escape

Last updated

In computer security, virtual machine escape (VM escape) is the process of a program breaking out of the virtual machine (VM) on which it is running and interacting with the host operating system. [1] In theory, a virtual machine is a "completely isolated guest operating system installation within a normal host operating system", [2] but this isn't always the case in practice.

Contents

For example, in 2008, a vulnerability (CVE - 2008-0923) in VMware discovered by Core Security Technologies made VM escape possible on VMware Workstation 6.0.2 and 5.5.4. [3] [4] A fully working exploit labeled Cloudburst was developed by Immunity Inc. for Immunity CANVAS (a commercial penetration testing tool). [5] Cloudburst was presented at Black Hat USA 2009. [6]

Previous known vulnerabilities

See also

References

  1. "What is VM Escape? - The Lone Sysadmin". 22 September 2007. Archived from the original on 9 December 2011. Retrieved 23 October 2011.
  2. "Virtual Machines: Virtualization vs. Emulation". Archived from the original on 2014-07-15. Retrieved 2011-03-11.
  3. "Path Traversal vulnerability in VMware's shared folders implementation". 18 May 2016.
  4. Dignan, Larry. "Researcher: Critical vulnerability found in VMware's desktop apps - ZDNet". ZDNet . Archived from the original on November 29, 2014.
  5. "Security Monitoring News, Analysis, Discussion, & Community". Dark Reading. Archived from the original on 2011-07-19. Retrieved 2011-10-23.
  6. "Black Hat ® Technical Security Conference: USA 2009 // Briefings". www.blackhat.com.
  7. "DEFCON 19: Virtunoid: Breaking out of KVM" (PDF). Nelson Elhage. Archived (PDF) from the original on 2024-12-04. Retrieved 2024-12-24.
  8. "VM escape - QEMU Case Study". Mehdi Talbi & Paul Fariello.
  9. "VMSA-2017-0006". VMware. Archived from the original on 2017-04-01. Retrieved 2017-04-01.
  10. 1 2 "VMSA-2017-0018.1". VMware. Archived from the original on 2017-11-18. Retrieved 2017-11-17.
  11. "CVE-2018-2698". exploit-db.com: Oracle VirtualBox < 5.1.30 / < 5.2-rc1 - Guest to Host Escape. 24 January 2018. Archived from the original on 10 December 2024. Retrieved 24 December 2024.
  12. "Chaos Communication Congress 2019: The Great Escape of ESXi". media.ccc.de. 28 December 2019.
  13. "CVE-2019-18420 to 18425". Patches beheben Schwachstellen in Xen und Citrix Hypervisor. 5 November 2019. Archived from the original on 5 November 2019. Retrieved 5 November 2019.
  14. "CVE-2019-0964 (critical), CVE-2019-5124, CVE-2019-5146, CVE-2019-5147". Sicherheitsupdate: AMD-Treiber und VMware. 22 January 2020. Archived from the original on 22 January 2020. Retrieved 22 January 2020.
  15. Mantle, Mark (2020-01-28). "Sicherheitslücken in Intel-CPUs: Modifizierte Angriffe erfordern BIOS-Updates". Heise (in German). Archived from the original on 2024-01-10. Retrieved 2024-01-10.
  16. "CVE-2020-3962, CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3966, CVE-2020-3967, CVE-2020-3968, CVE-2020-3969, CVE-2020-3970, CVE-2020-3971". VMWare Advisory VMSA-2020-0015.1.