Overview
Some 64-bit operating systems and virtualization software running on Intel CPU hardware are vulnerable to a local privilege escalation attack. The vulnerability may be exploited for local privilege escalation or a guest-to-host virtual machine escape.
Intel claims that this vulnerability is a software implementation issue, as their processors are functioning as per their documented specifications. However, software that fails to take the Intel-specific SYSRET behavior into account may be vulnerable.
Description
A ring3 attacker may be able to specifically craft a stack frame to be executed by ring0 (kernel) after a general protection exception (#GP). The fault will be handled before the stack switch, which means the exception handler will be run at ring0 with an attacker's chosen RSP causing a privilege escalation.
Details from Red Hat RHSA-2012:0720-1 & RHSA-2012:0721-1: It was found that the Xen hypervisor implementation as shipped with Red Hat Enterprise Linux 5 did not properly restrict the syscall return addresses in the sysret return path to canonical addresses. An unprivileged user in a 64-bit para-virtualized guest, that is running on a 64-bit host that has an Intel CPU, could use this flaw to crash the host or, potentially, escalate their privileges, allowing them to execute arbitrary code at the hypervisor level. (CVE-2012-0217, Important) Details from some affected vendors were not available at the time of publication. |
Impact
A local authenticated attacker may exploit this vulnerability for operating system privilege escalation or for a guest-to-host virtual machine escape. |
Solution
Apply an Update |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 6.6 | AV:L/AC:M/Au:S/C:C/I:C/A:C |
Temporal | 5.5 | E:F/RL:OF/RC:C |
Environmental | 5.5 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
- http://en.wikipedia.org/wiki/Ring_3
- http://lists.xen.org/archives/html/xen-announce/2012-06/msg00001.html
- http://blog.xen.org/index.php/2012/06/13/the-intel-sysret-privilege-escalation/
- https://bugzilla.redhat.com/show_bug.cgi?id=813428
- http://security.freebsd.org/advisories/FreeBSD-SA-12:04.sysret.asc
- http://blog.gmane.org/gmane.linux.kernel.commits.2-4/month=20060401
- http://lists.xen.org/archives/html/xen-devel/2012-06/msg01072.html
- http://www.vupen.com/blog/20120904.Advanced_Exploitation_of_Xen_Sysret_VM_Escape_CVE-2012-0217.php
Acknowledgements
Thanks to Rafal Wojtczuk of Bromium, Inc. for reporting this vulnerability.
This document was written by Jared Allar.
Other Information
CVE IDs: | CVE-2012-0217, CVE-2006-0744 |
Date Public: | 2006-04-12 |
Date First Published: | 2012-06-12 |
Date Last Updated: | 2012-09-04 20:47 UTC |
Document Revision: | 88 |