OMEN
04-16-2009, 07:40 PM
Mac owners' worst nightmare -- get hacked by Windows -- possible, says researcher
A bug in VMware's Fusion virtualization software could be used to run malicious code on a Mac by exploiting Windows in a virtual machine, a security researcher said today.
VMware has released Fusion 2.0.4 to plug the hole.
According to Kostya Kortchinsky, an exploit researcher at Immunity Inc., a critical vulnerability in VMware's virtual machine display function can be used to read and write memory on the "host" operating system -- the OS running the physical hardware.
Kortchinsky crafted an exploit for Immunity's customers and posted a video clip that demonstrates an attack on a machine running Windows Vista Service Pack 1 as the host operating system, and Windows XP as the "guest" -- the OS running in a virtual machine.
"This is indeed a guest-to-host exploit," Kortchinsky said in an e-mail today. "It uses several vulnerabilities in the 'Display functions' (as VMware put it) that allow [someone] to read and write arbitrary memory in the host. Thus the guest can run some code on the host, effectively bypassing ASLR and DEP on Vista SP1."
The same tactics can be employed against a guest operating system -- say, Windows XP -- running in Fusion on a Mac powered by Apple's Mac OS X, Kortchinsky confirmed. "The vulnerability is also present in VMware Fusion and as such would allow a guest (Windows or Linux) to run code on the Mac OS X host," he said. "We didn't implement this exploit though, but will probably in a near future."
The the Miami-based company -- best known for its Canvas penetration-testing tool -- has published a white paper discussing the VMware vulnerabilities, as well as working exploits that can compromise Windows or Ubuntu hosts. However, the paper and exploits are available only to Canvas Early Updates customers.
VMware issued a security advisory last Friday acknowledging the bug and provided links to new versions of its products that patch the problem. Fusion 2.0.4, a 186MB file, can be downloaded free of charge from VMware's site by current users of the company's Mac virtualization software.
Most of the Mac customers using Fusion and its primary commercial competitor, Parallels Desktop, want a virtual environment to run Windows and select applications available only for Microsoft's operating system. Sales of Fusion and Parallels were up 50% last September over the same month the year before, market research company NPD Group said at the time.
Compworld
A bug in VMware's Fusion virtualization software could be used to run malicious code on a Mac by exploiting Windows in a virtual machine, a security researcher said today.
VMware has released Fusion 2.0.4 to plug the hole.
According to Kostya Kortchinsky, an exploit researcher at Immunity Inc., a critical vulnerability in VMware's virtual machine display function can be used to read and write memory on the "host" operating system -- the OS running the physical hardware.
Kortchinsky crafted an exploit for Immunity's customers and posted a video clip that demonstrates an attack on a machine running Windows Vista Service Pack 1 as the host operating system, and Windows XP as the "guest" -- the OS running in a virtual machine.
"This is indeed a guest-to-host exploit," Kortchinsky said in an e-mail today. "It uses several vulnerabilities in the 'Display functions' (as VMware put it) that allow [someone] to read and write arbitrary memory in the host. Thus the guest can run some code on the host, effectively bypassing ASLR and DEP on Vista SP1."
The same tactics can be employed against a guest operating system -- say, Windows XP -- running in Fusion on a Mac powered by Apple's Mac OS X, Kortchinsky confirmed. "The vulnerability is also present in VMware Fusion and as such would allow a guest (Windows or Linux) to run code on the Mac OS X host," he said. "We didn't implement this exploit though, but will probably in a near future."
The the Miami-based company -- best known for its Canvas penetration-testing tool -- has published a white paper discussing the VMware vulnerabilities, as well as working exploits that can compromise Windows or Ubuntu hosts. However, the paper and exploits are available only to Canvas Early Updates customers.
VMware issued a security advisory last Friday acknowledging the bug and provided links to new versions of its products that patch the problem. Fusion 2.0.4, a 186MB file, can be downloaded free of charge from VMware's site by current users of the company's Mac virtualization software.
Most of the Mac customers using Fusion and its primary commercial competitor, Parallels Desktop, want a virtual environment to run Windows and select applications available only for Microsoft's operating system. Sales of Fusion and Parallels were up 50% last September over the same month the year before, market research company NPD Group said at the time.
Compworld