Virtual mashinadan qochish - Virtual machine escape - Wikipedia

Yilda kompyuter xavfsizligi, virtual mashinadan qochish dasturidan chiqib ketish jarayoni virtual mashina u ishlaydigan va uy egasi bilan o'zaro aloqada bo'lgan operatsion tizim.[1] Virtual mashina - bu "oddiy xost operatsion tizimida to'liq ajratilgan mehmon operatsion tizimini o'rnatish".[2] 2008 yilda zaiflik (CVE -2008-0923 ) ichida VMware tomonidan kashf etilgan Asosiy xavfsizlik texnologiyalari VMware Workstation 6.0.2 va 5.5.4 da VM qochish imkoniyatini yaratdi.[3][4] To'liq ishlaydigan ekspluatatsiya belgilangan Bulutli portlash tomonidan ishlab chiqilgan Immunity Inc. Immunitet CANVAS uchun (penetratsiyani tijorat vositasi).[5] Cloudburst taqdim etildi Qora shapka AQSh 2009 yil.[6]

Ilgari ma'lum bo'lgan zaifliklar

  • CVE -2007-1744 VMware uchun umumiy papkalarda kataloglar o'tishining zaifligi xususiyati
  • CVE-2008-0923 VMware uchun umumiy papkalarda kataloglar o'tishining zaifligi xususiyati
  • CVE-2009-1244 Cloudburst: VMware-da VM displey funktsiyasi
  • CVE-2011-1751 QEMU-KVM: PIIX4 emulyatsiyasi tarmoqdan uzilishdan oldin qurilmaning issiq ulanishi mumkinligini tekshirmaydi[7]
  • CVE-2012-0217 Xen 4.1.2 va undan oldingi versiyadagi x86-64 yadrosi tizim-chaqiruv funktsiyasi
  • CVE-2014-0983 Oracle VirtualBox 3D tezlashuvi bir nechta xotira buzilishi
  • CVE-2015-3456 VENOM: QEMU virtual floppi diskini boshqarish moslamasida bufer-overflow
  • CVE-2015-7835 Xen giper maslahatchisi: PV mehmonlari tomonidan katta sahifa xaritalarini nazoratsiz yaratish
  • CVE-2016-6258 Xen Hypervisor: PV pagetable kodida oldindan mavjud pagetable yozuvlariga yangilanishlarni kiritish, xavfsiz holatlarda qimmat qayta tekshirishni o'tkazib yuborish uchun tezkor yo'llar mavjud (masalan, faqat kirish / iflos bitlarni tozalash). Xavfsiz deb hisoblangan bitlar juda keng va aslida xavfsiz emas edi.
  • CVE-2016-7092 Xen Hypervisor: 32-bitli PV mehmonlari uchun L3 rekursiv pagetable dasturini taqiqlash
  • CVE-2017-5715, 2017-5753, 2017-5754: Spectre va Meltdown apparatining zaif tomonlari, protsessor darajasiga (Rogue Data Cache Load (RDCL)) qarshi kesh-kanal hujumi, yolg'onchi jarayonga barcha xotiralarni o'qishga imkon beradi. kompyuter, hatto virtual mashinaga tayinlangan xotiradan tashqarida
  • CVE-2017-0075 Hyper-V masofaviy kodni bajarilishining zaifligi
  • CVE-2017-0109 Hyper-V masofaviy kodni bajarilishining zaifligi
  • CVE-2017-4903 VMware ESXi, Workstation, Fusion: SVGA drayveri buferni to'ldirishni o'z ichiga oladi, bu mehmonlarga xostlarda kodni bajarishga imkon beradi.[8]
  • CVE-2017-4934 VMware Workstation, Fusion: VMNAT qurilmasidagi bufer bilan to'lib toshgan zaiflik, bu mehmonga xostda kod bajarishiga imkon beradi.[9]
  • CVE-2017-4936 VMware Workstation, Horizon View: Cortado ThinPrint orqali o'qishdan tashqari bir nechta muammolar mehmonga kodni ishga tushirishi yoki Windows OS-da xizmat ko'rsatishni rad etishi mumkin.[9]
  • CVE-2018-2698 Oracle VirtualBox: VGA tomonidan umumiy xotira interfeysi host OS-da o'qish va yozish imkonini beradi[10]
  • CVE-2018-12126, CVE-2018-12130, CVE-2018-12127, CVE-2019-11091: "Microarchitectural Data Sampling" (MDS) hujumlari: Yuqoridagi Spectre va Meltdown hujumlariga o'xshab, protsessor darajasidagi ushbu kesh-kanal hujumi VM-lardagi ma'lumotlarni va hatto xost tizimining ma'lumotlarini o'qishga imkon beradi. Pastki turlari: Microarchitectural Store Buffer Data Sampling (MSBDS), Microarch Architectural Fill Buffer Data Sampling (MFBDS) = Zombieload, Microarchitectural Load Port Data Sampling (MLPDS), and Microarch Architectural Data Pampling Uncacheable Memory (MDSUM)
  • CVE-2019-18420, CVE-2019-18421, CVE-2019-18422, CVE-2019-18423, CVE-2019-18424, CVE-2019-18425: Xen giper maslahatchisi va Citrix giper maslahatchisi: Mehmon virtual mashinalariga xost tizimini buzishga imkon beradi (xizmat ko'rsatishni rad etish va huquqlarning ko'tarilishi) [11]
  • CVE-2019-5183 (muhim), CVE-2019-5124, CVE-2019-5146, CVE-2019-5147: Adrenalin drayveri yordamida AMD Radeon grafik kartalaridan foydalangan holda Windows 10 va VMWare Workstation: mehmon tizimidagi tajovuzkor xost tizimida xotira xatosini keltirib chiqarishi, xost tizimiga zararli kod kiritishi va uni bajarishi uchun piksel shaderidan foydalanishi mumkin.[12]
  • CVE-2018-12130, CVE-2019-11135, CVE-2020-0548: ZombieLoad, ZombieLoad v2, Vektorli registrdan namuna olish (VRS), Mikroarxitektura ma'lumotlaridan namuna olish (MDS), Transactional asynchronous abort (TAA), CacheOut, L1D Eviction Sampling (L1DES): L1 kesh tomonidagi hujumlar protsessor darajasida virtual mashinalar xotirani tashqarida o'qishga imkon beradi. ularning qum maydonidan[13]
  • CVE-2020-3962, CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3966, CVE-2020-3967, CVE-2020-3968, CVE-2020-3969, CVE- 2020-3970, CVE-2020-3971: VMware ESXi, Workstation Pro / Player, Fusion Pro, Cloud Foundation: SVGA, grafik shader, USB drayveri, xHCI / EHCI, PVNVRAM va vmxnet3-dagi zaifliklar virtual mashinaning qochishiga olib kelishi mumkin.[14]

Shuningdek qarang

Adabiyotlar

  1. ^ "VM Escape nima? - Yolg'iz Sysadmin". 2007 yil 22 sentyabr.
  2. ^ "Virtual mashinalar: virtualizatsiya va taqlid". Olingan 2011-03-11.
  3. ^ "VMware-ning umumiy papkalarini tatbiq etishda yo'lni bosib o'tishning zaifligi". 2016 yil 18-may.
  4. ^ Dignan, Larri. "Tadqiqotchi: VMware-ning ish stoli dasturlarida muhim zaiflik - ZDNet".
  5. ^ "Xavfsizlikni kuzatish bo'yicha yangiliklar, tahlillar, munozaralar va jamoat". Qorong'u o'qish.
  6. ^ "Black Hat ® Texnik Xavfsizlik Konferentsiyasi: AQSh 2009 // Brifinglar". www.blackhat.com.
  7. ^ "DEFCON 19: Virtunoid: KVMdan chiqib ketish" (PDF). www.defcon.org.
  8. ^ "VMSA-2017-0006". VMware.
  9. ^ a b "VMSA-2017-0018.1". VMware.
  10. ^ "CVE-2018-2698". securiteam.com: Oracle VirtualBox-ning zaifliklaridan qochish uchun bir nechta mehmon.
  11. ^ "CVE-2019-18420 dan 18425 gacha". Shvachstellen Xen und Citrix Hypervisor-da yamalar.
  12. ^ "CVE-2019-0964 (muhim), CVE-2019-5124, CVE-2019-5146, CVE-2019-5147". Sicherheitsupdate: AMD-Treiber und VMware.
  13. ^ [Mikroarxitektura ma'lumotlari namunalari (MDS) va tranzaktsion asenkron abort (TAA) "CVE-2018-12130, CVE-2019-11135, CVE-2020-0548"] Tekshiring | url = qiymati (Yordam bering). Intel-CPU-larda ishlaydigan signallar: Modifizierte Angriffe erfordern BIOS-Updates.
  14. ^ "CVE-2020-3962, CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3966, CVE-2020-3967, CVE-2020-3968, CVE-2020-3969, CVE" -2020-3970, CVE-2020-3971 ". VMWare maslahat VMSA-2020-0015.1.

Tashqi havolalar