|  |  | 
  
    |  |  | 
 
  |   |  | 
  
    |  |  | 
  
    |  |  | 
  
    |   xen-bugs
[Xen-bugs] [Bug 1068] New: Guest root can escape to domain 0	through gru 
| http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1068
           Summary: Guest root can escape to domain 0 through grub.conf and
                    pygrub
           Product: Xen
           Version: 3.0.3
          Platform: All
        OS/Version: Linux
            Status: NEW
          Severity: major
          Priority: P2
         Component: Tools
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: jorispubl@xxxxxxxxx
When booting a guest domain, pygrub uses Python exec() statements to process
untrusted data from grub.conf. By crafting a grub.conf file, the root user in a
guest domain can trigger execution of arbitrary Python code in domain 0.
The offending code is in tools/pygrub/src/GrubConf.py, in lines such as
  exec("%s = r\"%s\"" %(self.commands[com], arg.strip()))
This can be exploited from a guest domain, for example by modifying
/boot/grub/grub.conf and changing the 'default' statement into something like
  default "+str(0*os.system(" insert evil command here "))+"
On the next boot of the guest domain, the evil command will execute in domain
0.
-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
 | 
 
| <Prev in Thread] | Current Thread | [Next in Thread> |  | 
[Xen-bugs] [Bug 1068] New: Guest root can escape to domain 0	through grub.conf and pygrub,
bugzilla-daemon <=
 |  |  | 
  
    |  |  |