查看: 3784|回复: 2

注意了!VMware的致命BUG可导致“真正的”Windows被干掉

[复制链接]
发表于 2008-3-1 09:40:01 | 显示全部楼层 |阅读模式
喜欢用虚拟机来玩病毒的朋友注意了!VMware公司已经确认,该公司推出的虚拟机软件存在着一个漏洞,可以使攻击者脱离“客户”操作系统,并在“主机”中修改和添加文件。截至到目前位置,尚无补丁可以堵住这个漏洞!所有Windows版本,包括Workstation、Player、ACE都受此漏洞影响。而Windows servers、Mac、Linux版本暂时没有发现这个问题。这个漏洞是有Core Security Technologies公司发现,VMWare表示“攻击者可以利用此漏洞冲破客户系统,从而控制主机”。
回复

使用道具 举报

 楼主| 发表于 2008-3-1 09:41:08 | 显示全部楼层
这个是英文的介绍


February 24, 2008 (Computerworld) A critical vulnerability in VMware Inc.'s virtualization software for Windows lets attackers escape the "guest" operating system and modify or add files to the underlying "host" operating system, the company has acknowledged.

As of Sunday, there was no patch available for the flaw, which affects VMware's Windows client virtualization programs, including Workstation, Player and ACE. The company's virtual machine software for Windows servers and for Mac- and Linux-based hosts are not at risk.

The bug was reported by Core Security Technologies, makers of the penetration-testing framework CORE IMPACT, said VMware in a security alert issued last Friday. "Exploitation of this vulnerability allows attackers to break out of an isolated guest system to compromise the underlying host system that controls it," claimed Core Security.

According to VMware, the bug is in the shared-folder feature of its Windows client-based virtualization software. Shared folders let users access certain files -- typically documents and other application-generated files -- from the host operating system and any virtual machine on that physical system.

"On Windows hosts, if you have configured a VMware host-to-guest shared folder, it is possible for a program running in the guest to gain access to the host's complete file system and create or modify executable files in sensitive locations," confirmed VMware.

VMware has not posted a fix, but it instead told users to disable shared folders.

The Palo Alto, Calif.-based company also made it clear that the vulnerability isn't present in its server line of virtual machine software; VMware Server and ESX Server do not use shared folders. Newer versions of VMware's Windows client virtualization tools also disable shared folders by default, the company added. Users must manually turn on the feature to be vulnerable.

A similar bug was reported by VeriSign Inc.'s iDefense Labs to VMware in March 2007. VMware patched it about a month later.

Friday's alert, however, was the second security-related notice posted by VMware in two days. On Thursday, VMware patched its ESX Server line to quash five bugs that could be used to slip past security restrictions, launch denial-of-service attacks or compromise virtualized systems.

The increased reliance on virtual machines, particularly on enterprise servers, has come with its own set of security problems, researchers and IT administrators have noted previously. Sunday, an analyst at the SANS Institute's Internet Storm Center (ISC) extended that warning to desktop virtualization users, particularly security professionals.

"We make an extensive use of virtualization technologies for multiple purposes: malware analysis, incident response, forensics, security testing, training, etc., and we typically use the client versions of the products," said Raul Siles in a post to the ISC blog. "It is time to disable the shared-folder capabilities."
回复

使用道具 举报

发表于 2008-3-1 19:47:19 | 显示全部楼层
只是,该用还得用阿~
回复

使用道具 举报

高级模式
B Color Image Link Quote Code Smilies |上传

本版积分规则

快速回复 返回顶部 返回列表