[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[FD] Xen VM Escape
- To: fulldisclosure@xxxxxxxxxxxx
- Subject: [FD] Xen VM Escape
- From: Alan Hikerell <hikerell@xxxxxxxxx>
- Date: Thu, 29 Oct 2015 23:39:39 +0800
Xen XSA-148(http://xenbits.xen.org/xsa/advisory-148.html) is the real VM
Escape Vulnerability
XSA-148 is public just now and it's a memory management logic vulnerability
obviously.
The bulletin means that a micious PV DomU could enable PS/RW flag of its
PDE to read/write the 2M page.
So, if a attacker prepare a page table at the 2M page, he could use the
vulnerability to modify the PT.
Finally, this vulnerability changes to a arbitrary machine memory
read/write vulnerability.
--
hikerell
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/