Never Ending Security

It starts all here

prl_guest_to_host – Guest to host VM escape exploit for Parallels Desktop

Guest to host VM escape exploit for Parallels Desktop.
Tested on Parallels Desktop 10 for Mac.

Works on all of the x86 and x64 Windows guests under the user accounts with any privileges level.

Known issues:

 * Command output might be missing when running from low-privileged user accounts.

More information at http://blog.cr4.sh/2014/11/simple-guest-to-host-vm-escape-for.html

Discovered by:    
Dmytro Oleksiuk
    
https://github.com/Cr4sh/prl_guest_to_host

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s