March 2022
Intermediate to advanced
752 pages
18h 47m
English
In this chapter, we cover the following topics:
• Root cause analysis of a device emulation vulnerability in QEMU
• USB and EHCI basics
• Development of a VM escape exploit for a user-mode worker process (QEMU)
In this chapter, we will analyze and exploit CVE-2020-14364,1 by Xiao Wei and Ziming Zhang, in QEMU’s USB emulation code. It is a simple and reliable vulnerability, which makes it a great case study. Hypervisors such as KVM and Xen use QEMU as their worker process component, so when we target QEMU, we will be performing user-mode exploitation.
This chapter assumes that on your host you are using a Linux installation with KVM virtualization enabled and that you have a working install ...