-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Invisible Things Lab is proud to present: "Adventures with a certain Xen vulnerability (in the PVFB backend)" by Rafal Wojtczuk *** Starring Xen 3.2.0, DomU (an ordinary virtual machine, paravirtualized), Dom0 (privileged administrative domain) running on FC8 with NX, ASLR and SELinux enabled, The Evil Hacker, and a certain vulnerability in the Frame Buffer backend. Plot The Evil Hacker escapes from DomU and gets into Dom0. Using clever ret-into-libc technique he succeeds with his attack on x86 architecture, despite the NX and ASLR deployed in Dom0 OS (Fedora Core 8). The Evil Hacker is also not discouraged by the fact that the target OS has SELinux protection enabled - he demonstrates how the particular SELinux policy for Xen, used by default on FC8, can be bypassed. Ultimately he gets full root access in Dom0. Rafal also discusses variation of the exploitation on x86_64 architecture - he partially succeeds, but his x64 exploit doesn't work in certain circumstances. *** Curious individuals can get the full paper here: http://invisiblethingslab.com/pub/xenfb-adventures-10.pdf *** This paper is one of the outcomes of a broader research into Xen and virtualization security sponsored by Phoenix Technologies. *** This paper is also a teaser for our upcoming Virtualization Security Training, that is scheduled for Spring 2009. Stay tuned for more details. *** Sincerely, Joanna Rutkowska CEO (and Head of PR:) Invisible Things Lab http://invisiblethingslab.com/ -----BEGIN PGP SIGNATURE----- Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkj18oYACgkQORdkotfEW86VCACgzEeW02yuFASNluRDAiIw7w9H OzQAn0FUVLHrTIJQeTKPrhwnrOBpthmj =jafU -----END PGP SIGNATURE-----