That is different from what you quoted above. Of course it is easily possible for Windows malware to hurt the OS X environment in several ways ranging from denial of service (depleting file space), data harvesting the OS X file system, planting a binary in a writable directory and modifying the user's shell profiile to execute it. There are three different methods available now with three different purposes, and I don't even think of these things for a living. Imagine what a professional cracker could come up with. Now the only reason these three samples are even possible is because global sharing is on by default. Is there an exploit written to take advantage? Not yet, but I could have one finished by the end of the day, not that I would or have any interest in doing so. Now all that is needed is to exploit Windows - a nice new unpatched Win2K or XP installation should take about 10 minutes to crack.
Don't expect Aunt Vivian and Uncle Fred to understand any of this - their grand kids did the Parallels installation so they could use their favorite Windows chat proggy when they visit during Easter break.
The point being, no part of that statement you quoted from Parallels is true with an out of the box installation.
As for VM access to the host's unprotected services - no other VM I use or have used does this. Beginning with OS/2 running Windows or DOS in a VM to Solaris' containers to VMWare running on the Mac, Linux, and Windows - only Parallels out of the box gives my VM access to the host. Solaris containers kick butt, btw. Creating Sol 10 VMs within a Parallels VM is a fun little exercise.
Last edited: Jan 28, 2007