SlideShare a Scribd company logo
VENOM DEMO & FAQ
Akash Mahajan
VENOM is an acronym for
V IRTUALIZE D
ENVIRONMENT
NEGLEC TE D
O PE RATIONS
M ANIPULATION
What is VENOM?
It is a security vulnerability in the
virtual floppy drive code used by
many computer virtualization
platforms.
What does it do?
This vulnerability may allow an
attacker to escape from the confines
of an affected virtual machine (VM)
guest and potentially obtain code-
execution access to the host.
Why is it a big deal?
He was right
about the
cloud, wasn’t
he!
Seriously why is this a big deal?
• Consider that all the cloud vendors in the
world use OS level virtualization
• Now all of those who use Xen, Qemu, KVM
and Virtualbox were vulnerable to this
• It doesn’t matter if the virtual machine is a
linux box or a windows box
All of these use Xen/Qemu/KVM
How does it work?
• So a VM (guest) gets access to virtual
hardware of a physical machine (host)
• Quick EMUlator (QEMU) is an open source
hypervisor that performs hardware
virtualization
Exploiting the QEMU Hypervisor
• The hypervisor code sits between the guest and the
host, operating as the ‘bridge’ and abstraction layer
relied upon by either side to communicate with the
other.
• Incorporating all of the memory mapping and device
drivers required to trick the guest into believing it is
operating on real hardware.
Hypervisor and XEN
QEMU Floppy Disk Controller
• The QEMU FDC is enabled by default in Xen
and KVM platforms.
• The problem exists in the Floppy Disk
Controller, which is initialized for every x86 and
x86_64 guest regardless of the configuration
and cannot be removed or disabled.
QEMU Floppy Disk Controller
• The QEMU FDC is enabled by default in Xen
and KVM platforms.
• The problem exists in the Floppy Disk
Controller, which is initialized for every x86 and
x86_64 guest regardless of the configuration
and cannot be removed or disabled.
One Ring to Rule Them all
The Devil is in the C Code
• FDC uses a buffer of 512 bytes to store the I/O
command and its parameters
• It has an index variable to access the buffer
area
• After every command the index variable is set
to 0
Still the Devil is in the C Code
The FDC’s data_pos and data_len fields above are
initialized to 0 upon FDC reset.
• For two of the command handler functions, the
data_pos reset is delayed or circumvented.
– FDC_CMD_READ_ID
– FDC_CMD_DRIVE_SPECIFICATION_COMMAND
Buffer Overflow of FIFO buffer
• The VENOM advisory talks about overflow
of the *fifo buffer due to this particular
reason
BARELY WORKING DEMO
Deja VM Bugs
• BlackHat/DEFCON 2011 Talk: Breaking Out of KVM
• CVE-2007-1744 – Directory traversal vulnerability in
shared folders feature
• CVE-2008-0923 – Path traversal vulnerability in
VMware’s shared folders implementation
• CVE-2009-1244 – Cloudburst (VMware virtual video
adapter vulnerability)
• CVE-2011-1751 – Missing hotplug check during device
removal
• CVE-2012-0217 – 64-bit PV guest privilege escalation
vulnerability
• CVE-2014-0983 – Oracle VirtualBox 3D acceleration
multiple memory corruption vulnerabilities
Questions?
• Ask Datta!
@makash | aka@null.co.in | theappseclab.com
Attributions and References
• Starting point for understanding http://venom.crowdstrike.com/
• http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
• https://access.redhat.com/articles/1444903
• CC BY-SA 3.0 File:Priv rings.svg Uploaded by OgreBot
• https://en.wikipedia.org/wiki/Protection_ring#Hypervisor_mode
• https://blog.nelhage.com/2011/08/breaking-out-of-kvm/
• https://github.com/nelhage/virtunoid
• http://www.dedoimedo.com/computers/kvm-intro.html
• http://blog.crowdstrike.com/venom-vulnerability-details/
• http://www.dedoimedo.com/computers/kvm-intro.html

More Related Content

PPTX
Trust No-One Architecture For Services And Data
PPTX
Azure security
PDF
Security OF The Cloud
PPTX
Windows Azure Security Features And Functionality
PDF
Virtualization presentation
PDF
Networking deep dive
PPTX
Azure Networking - The First Technical Challenge
PPTX
Cloud Security
Trust No-One Architecture For Services And Data
Azure security
Security OF The Cloud
Windows Azure Security Features And Functionality
Virtualization presentation
Networking deep dive
Azure Networking - The First Technical Challenge
Cloud Security

What's hot (18)

PPTX
Azure Security Fundamentals
PDF
Best Practices in Cloud Security
PDF
Microsoft Azure Security Overview
PPTX
Azure Security Overview
PDF
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
PPTX
VMware vRealize Network Insight 3.4 whats new
PDF
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
PPTX
Azure Security and Management
PPTX
Cisco Security portfolio update
PPTX
VMware vRealize Network Insight 3.5 - Whats New
PPTX
vRealize Network Insight 3.9
PPTX
Improving Application Security With Azure
PDF
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
PDF
Slashing Your Cloud Risk: 3 Must-Do's
PDF
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
PPT
Cloud Security
PPTX
CLOUDSEC LONDON 2016 - Puneet Kukreja - Enabling Cloud Security -
PPTX
Cloud Security
Azure Security Fundamentals
Best Practices in Cloud Security
Microsoft Azure Security Overview
Azure Security Overview
SCUGBE_Lowlands_Unite_2017_Rest azured microsoft cloud demystified
VMware vRealize Network Insight 3.4 whats new
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Azure Security and Management
Cisco Security portfolio update
VMware vRealize Network Insight 3.5 - Whats New
vRealize Network Insight 3.9
Improving Application Security With Azure
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Slashing Your Cloud Risk: 3 Must-Do's
Webinar NETGEAR - Acronis e Netgear una panoramicadelle soluzioni per la prot...
Cloud Security
CLOUDSEC LONDON 2016 - Puneet Kukreja - Enabling Cloud Security -
Cloud Security
Ad

Viewers also liked (20)

PDF
LCEU13: Securing your cloud with Xen's advanced security features - George Du...
PDF
Radare2 - An Introduction by Anto Joseph
PPTX
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
PPTX
Threat intelligence - nullmeetblr 21st June 2015
PDF
Demystifying captcha Bangalore Meet April 18
PDF
Secuirty News Bytes-Bangalore may 2014
PDF
Browser Exploit Framework
PPTX
The Shellshocker
PPTX
IOS Security Basics - NULL/ OWASP/G4H Meet
PPTX
Netcat - A Swiss Army Tool
PPTX
IE Memory Protector
PDF
Owasp Mobile Top 10 – 2014
PPTX
Recon ng null meet April 2015
PDF
Owasp m7-m8-shivang nullmeetblr 21june2015
PPTX
Dark Arts Of Social Engineering
LCEU13: Securing your cloud with Xen's advanced security features - George Du...
Radare2 - An Introduction by Anto Joseph
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
Threat intelligence - nullmeetblr 21st June 2015
Demystifying captcha Bangalore Meet April 18
Secuirty News Bytes-Bangalore may 2014
Browser Exploit Framework
The Shellshocker
IOS Security Basics - NULL/ OWASP/G4H Meet
Netcat - A Swiss Army Tool
IE Memory Protector
Owasp Mobile Top 10 – 2014
Recon ng null meet April 2015
Owasp m7-m8-shivang nullmeetblr 21june2015
Dark Arts Of Social Engineering
Ad

Similar to Venom vulnerability Overview and a basic demo (20)

PDF
Kernel Mode Threats and Practical Defenses
PDF
RMLL / LSM 2009
PDF
Rmll Virtualization As Is Tool 20090707 V1.0
PDF
VM Forking and Hypervisor-based Fuzzing with Xen
PPTX
Venom vulnerability
PDF
OffensiveCon2022: Case Studies of Fuzzing with Xen
PDF
KVM-22-Supporting TEE on x86 client platforms with pKVM_2.pdf
PPTX
17-virtualization.pptx
PDF
Fuzzing_with_Xen.pdf
PPT
Virtualization
PDF
Joyent's Bryan Cantrill: Experiences Porting KVM to SmartOS at KVM Forum, Aug...
PDF
Experiences porting KVM to SmartOS
PPT
virtual machine.ppt
PPTX
5. IO virtualization
PDF
Kvm virtualization in_rhel_7
PPTX
CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...
PDF
ZertoCON_Support_Toolz.pdf
PDF
RHEL5 XEN HandOnTraining_v0.4.pdf
PDF
VSPEX Blue, une infrastructure hyper-convergée simple et sûre pour votre SDDC
 
PDF
ELC21: VM-to-VM Communication Mechanisms for Embedded
Kernel Mode Threats and Practical Defenses
RMLL / LSM 2009
Rmll Virtualization As Is Tool 20090707 V1.0
VM Forking and Hypervisor-based Fuzzing with Xen
Venom vulnerability
OffensiveCon2022: Case Studies of Fuzzing with Xen
KVM-22-Supporting TEE on x86 client platforms with pKVM_2.pdf
17-virtualization.pptx
Fuzzing_with_Xen.pdf
Virtualization
Joyent's Bryan Cantrill: Experiences Porting KVM to SmartOS at KVM Forum, Aug...
Experiences porting KVM to SmartOS
virtual machine.ppt
5. IO virtualization
Kvm virtualization in_rhel_7
CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...
ZertoCON_Support_Toolz.pdf
RHEL5 XEN HandOnTraining_v0.4.pdf
VSPEX Blue, une infrastructure hyper-convergée simple et sûre pour votre SDDC
 
ELC21: VM-to-VM Communication Mechanisms for Embedded

More from Akash Mahajan (17)

PDF
On Writing Well - A talk given at WinjaBlogs Session
PDF
App sec in the time of docker containers
PPTX
Security in the cloud Workshop HSTC 2014
ODP
INCOMPLETE - OUTLINE for RootConf 2014 - The little-servcie-which-wasn't-there
PPTX
The real incident of stealing a droid app+data
PPTX
Believe It Or Not SSL Attacks
PPTX
I haz your mouse clicks and key strokes
PPTX
Hackers versus Developers and Secure Web Programming
PPTX
Secure HTTP Headers c0c0n 2011 Akash Mahajan
PPTX
Php security
PPTX
Secure passwords-theory-and-practice
PDF
Top 10 web application security risks akash mahajan
PDF
Web application security
PPTX
Web application security
PPTX
Web application security
PPTX
Secure Programming In Php
PPT
Startups Security
On Writing Well - A talk given at WinjaBlogs Session
App sec in the time of docker containers
Security in the cloud Workshop HSTC 2014
INCOMPLETE - OUTLINE for RootConf 2014 - The little-servcie-which-wasn't-there
The real incident of stealing a droid app+data
Believe It Or Not SSL Attacks
I haz your mouse clicks and key strokes
Hackers versus Developers and Secure Web Programming
Secure HTTP Headers c0c0n 2011 Akash Mahajan
Php security
Secure passwords-theory-and-practice
Top 10 web application security risks akash mahajan
Web application security
Web application security
Web application security
Secure Programming In Php
Startups Security

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
PDF
Encapsulation theory and applications.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
August Patch Tuesday
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
NewMind AI Weekly Chronicles - August'25-Week II
Getting Started with Data Integration: FME Form 101
Heart disease approach using modified random forest and particle swarm optimi...
Per capita expenditure prediction using model stacking based on satellite ima...
Machine learning based COVID-19 study performance prediction
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology
Encapsulation theory and applications.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
OMC Textile Division Presentation 2021.pptx
A comparative study of natural language inference in Swahili using monolingua...
TLE Review Electricity (Electricity).pptx
August Patch Tuesday
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Assigned Numbers - 2025 - Bluetooth® Document
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Accuracy of neural networks in brain wave diagnosis of schizophrenia
NewMind AI Weekly Chronicles - August'25-Week II

Venom vulnerability Overview and a basic demo

  • 1. VENOM DEMO & FAQ Akash Mahajan
  • 2. VENOM is an acronym for V IRTUALIZE D ENVIRONMENT NEGLEC TE D O PE RATIONS M ANIPULATION
  • 3. What is VENOM? It is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms.
  • 4. What does it do? This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code- execution access to the host.
  • 5. Why is it a big deal? He was right about the cloud, wasn’t he!
  • 6. Seriously why is this a big deal? • Consider that all the cloud vendors in the world use OS level virtualization • Now all of those who use Xen, Qemu, KVM and Virtualbox were vulnerable to this • It doesn’t matter if the virtual machine is a linux box or a windows box
  • 7. All of these use Xen/Qemu/KVM
  • 8. How does it work? • So a VM (guest) gets access to virtual hardware of a physical machine (host) • Quick EMUlator (QEMU) is an open source hypervisor that performs hardware virtualization
  • 9. Exploiting the QEMU Hypervisor • The hypervisor code sits between the guest and the host, operating as the ‘bridge’ and abstraction layer relied upon by either side to communicate with the other. • Incorporating all of the memory mapping and device drivers required to trick the guest into believing it is operating on real hardware.
  • 11. QEMU Floppy Disk Controller • The QEMU FDC is enabled by default in Xen and KVM platforms. • The problem exists in the Floppy Disk Controller, which is initialized for every x86 and x86_64 guest regardless of the configuration and cannot be removed or disabled.
  • 12. QEMU Floppy Disk Controller • The QEMU FDC is enabled by default in Xen and KVM platforms. • The problem exists in the Floppy Disk Controller, which is initialized for every x86 and x86_64 guest regardless of the configuration and cannot be removed or disabled.
  • 13. One Ring to Rule Them all
  • 14. The Devil is in the C Code • FDC uses a buffer of 512 bytes to store the I/O command and its parameters • It has an index variable to access the buffer area • After every command the index variable is set to 0
  • 15. Still the Devil is in the C Code The FDC’s data_pos and data_len fields above are initialized to 0 upon FDC reset. • For two of the command handler functions, the data_pos reset is delayed or circumvented. – FDC_CMD_READ_ID – FDC_CMD_DRIVE_SPECIFICATION_COMMAND
  • 16. Buffer Overflow of FIFO buffer • The VENOM advisory talks about overflow of the *fifo buffer due to this particular reason
  • 18. Deja VM Bugs • BlackHat/DEFCON 2011 Talk: Breaking Out of KVM • CVE-2007-1744 – Directory traversal vulnerability in shared folders feature • CVE-2008-0923 – Path traversal vulnerability in VMware’s shared folders implementation • CVE-2009-1244 – Cloudburst (VMware virtual video adapter vulnerability) • CVE-2011-1751 – Missing hotplug check during device removal • CVE-2012-0217 – 64-bit PV guest privilege escalation vulnerability • CVE-2014-0983 – Oracle VirtualBox 3D acceleration multiple memory corruption vulnerabilities
  • 20. Attributions and References • Starting point for understanding http://venom.crowdstrike.com/ • http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456 • https://access.redhat.com/articles/1444903 • CC BY-SA 3.0 File:Priv rings.svg Uploaded by OgreBot • https://en.wikipedia.org/wiki/Protection_ring#Hypervisor_mode • https://blog.nelhage.com/2011/08/breaking-out-of-kvm/ • https://github.com/nelhage/virtunoid • http://www.dedoimedo.com/computers/kvm-intro.html • http://blog.crowdstrike.com/venom-vulnerability-details/ • http://www.dedoimedo.com/computers/kvm-intro.html

Editor's Notes

  • #6: Free sticker to the first person who knows his full name Vishwa Bandhu Gupta
  • #7: Hyper-V wasn’t vulnerable to this. So Yay Microsoft
  • #10: http://blogs.it.ox.ac.uk/oxcert/2015/05/13/cve-2015-3456-venom/
  • #14: Privilege rings for the x86 available in protected mode