|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 1068] New: Guest root can escape to domain 0 through gru
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1068
Summary: Guest root can escape to domain 0 through grub.conf and
pygrub
Product: Xen
Version: 3.0.3
Platform: All
OS/Version: Linux
Status: NEW
Severity: major
Priority: P2
Component: Tools
AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
ReportedBy: jorispubl@xxxxxxxxx
When booting a guest domain, pygrub uses Python exec() statements to process
untrusted data from grub.conf. By crafting a grub.conf file, the root user in a
guest domain can trigger execution of arbitrary Python code in domain 0.
The offending code is in tools/pygrub/src/GrubConf.py, in lines such as
exec("%s = r\"%s\"" %(self.commands[com], arg.strip()))
This can be exploited from a guest domain, for example by modifying
/boot/grub/grub.conf and changing the 'default' statement into something like
default "+str(0*os.system(" insert evil command here "))+"
On the next boot of the guest domain, the evil command will execute in domain
0.
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-bugs] [Bug 1068] New: Guest root can escape to domain 0 through grub.conf and pygrub,
bugzilla-daemon <=
|
|
|
|
|