search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Virtual Machine Monitors (VMM) contain a memory deduplication vulnerability

Vulnerability Note VU#935424

Original Release Date: 2015-10-20 | Last Revised: 2015-10-21

Overview

Multiple vendors' implementations of Virtual Machine Monitors (VMM) are vulnerable to a memory deduplication attack.

Description

As reported in the "Cross-VM ASL INtrospection (CAIN)" paper, an attacker with basic user rights within the attacking Virtual Machine (VM) can leverage memory deduplication within Virtual Machine Monitors (VMM). This effectively leaks the randomized base addresses of libraries and executables in the processes of neighboring VMs. Granting the attacker the ability to leak the Address-Space Layout of a process within a neighboring VM results in the potential to bypass ASLR.

Impact

A malicious attacker with only user rights within the attacking VM can reliably determine the base address of a process within a neighboring VM. This information can be used to develop a code-reuse or return oriented programming exploit for a known vulnerability in a target process. Attacking the target process is outside the scope of the CAIN attack..

Solution

Deactivation of memory deduplication is the only known way to completely defend against the CAIN attack.

See CAIN paper for a list of other mitigations.

Vendor Information

935424
 

CVSS Metrics

Group Score Vector
Base 1.5 AV:L/AC:M/Au:S/C:P/I:N/A:N
Temporal 1.4 E:F/RL:W/RC:C
Environmental 1.0 CDP:N/TD:M/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Antonio Barresi, Kaveh Razavi, Mathias Payer, and Thomas R. Gross for reporting this vulnerability.

This document was written by Brian Gardiner.

Other Information

CVE IDs: CVE-2015-2877
Date Public: 2015-07-30
Date First Published: 2015-10-20
Date Last Updated: 2015-10-21 16:53 UTC
Document Revision: 42

Sponsored by CISA.