Vigil@nce: Windows 2008 Hyper-V, denial of service via VMBus
June 2011 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/
SYNTHESIS OF THE VULNERABILITY
An attacker, who is inside a guest system, can send a malicious
VMBus packet, in order to stop Hyper-V.
– Severity: 1/4
– Creation date: 15/06/2011
IMPACTED PRODUCTS
– Microsoft Windows 2008
DESCRIPTION OF THE VULNERABILITY
The Windows Server 2008 Hyper-V hypervisor manages virtualized
guest systems. The VMBus bus manages system partitions.
An attacker, who is inside a guest system with administrator
privileges, can send a malicious VMBus packet. This packet creates
an error in the VidLockObjectShared() function of the vmswitch.sys
driver, on a x64 processor.
An attacker, who is inside a guest system, can therefore send a
malicious VMBus packet, in order to stop Hyper-V.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Windows-2008-Hyper-V-denial-of-service-via-VMBus-10741