Moritz Muehlenhoff
2007-Apr-06  17:36 UTC
[Pkg-xen-devel] [holtmann@redhat.com: Re: [vendor-sec] CVE-2007-0998 HVM guest VNC server allows to compromise host]
Hi,
does this affect Debian's xen package?
Cheers,
        Moritz
----- Forwarded message from Marcel Holtmann <holtmann@redhat.com> -----
Subject: Re: [vendor-sec] CVE-2007-0998 HVM guest VNC server allows to
	compromise host
From: Marcel Holtmann <holtmann@redhat.com>
Date: Wed, 14 Mar 2007 17:26:05 +0100
Hi Moritz,
> > a few months back, the VNC server code in QEMU was extended in
upstream,
> > adding the 'feature' of monitor access by using Ctrl+Alt+2.
The monitor
> > allows you to do such fun commands such as changing the CDROM backing
> > file. Of course there's no validation on what files you map to the
CDROM
> > device and the QEMU instances for Xen run as root.
> > 
> > If you have a fullyvirtualized guest VM running the VNC server, then
any
> > user with access to the VNC server can happily enter a monitor command
> > such as
> > 
> >   'change cdrom /etc/passwd'. 
> > 
> > Which will map the /etc/passwd file through to the guest VM as
/dev/hdc,
> > read-write. So, aforementioned VNC console user can now login to the
> > guest OS, and by writing to /dev/hdc in the guest, change
> > the /etc/passwd file in the host. This is most certianly not what the
> > host administrator expects when giving access to a guest VM's VNC
> > console.
> > 
> > We assigned CVE-2007-0998 to this issue.
> 
> Thanks, can we consider this public?
yes, it is public. You can find our Bugzilla here:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230295
Regards
Marcel
_______________________________________________
Vendor Security mailing list
Vendor Security@lst.de
https://www.lst.de/cgi-bin/mailman/listinfo/vendor-sec
----- End forwarded message -----
