Today proof of concept code (source code, with a compiled binary) of a 0-day
privilege escalation vulnerability in almost all Windows operating system
versions (Windows XP, Vista, 7, Server 2008 ...) has been posted on a
popular programming web site.

The vulnerability is a buffer overflow in kernel (win32k.sys) and, due to
its nature allows an attacker to bypass User Access Control (UAC) on Windows
Vista and 7 operating systems.
What’s interesting is that the vulnerability exist in a function that
queries the registry so in order to exploit this the attacker has to be able
to create a special (malicious) registry key. Author of the PoC managed to
find such a key that can be created by a normal user on Windows Vista and 7
(so, a user that does not even have any administrative privileges).

The PoC code creates such a registry key and calls another library which
tries to read the key and during that process it ends up calling the
vulnerable code in win32k.sys.
Since this is a critical area of the operating system (the kernel allows no
mistakes), the published PoC only works on certain kernel versions while on
others it can cause a nice BSOD. That being said, the code can be probably
relatively easily modified to work on other kernel versions.

We are not aware of any exploitation of this vulnerability at the moment
and, since it can be exploited only locally, it obviously depends on another
attack vector, but knowing how users can be easy on clicking on unknown
files, this is definitely something we will keep our eye on and post updates
if we see exploitation.

The PoC has been in the mean time removed from the original site but now
that it has been published I’m sure that everyone who wants to get it can do
that easily.

QUICK UPDATE:

I just wanted to confirm that the PoC works as advertised, as you can see
below:

[image: PoC]
However, as expected (and stated by the PoC author), on my version of
Windows 7, which has win32k.sys 6.1.7600.16667, it is unstable and causes a
pretty nasty BSOD after couple of minutes (had even to restore the previous
system state to get Windows to boot).

TOOL can be downloaded from:  http://www.exploit-db.com/sploits/uacpoc.zip


-- 
Regards,
kishore sangaraju

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to