|
|
Windows kernel: buffer overflow in win32k!vSolidFillRect | |||
| Reported by cevans@google.com, Mar 31 2015 | Back to list | |||
Credit is to "Nils Sommer of bytegeist, working with Google Project Zero". I confirmed this myself in a Win7 32-bit VM (2048MB RAM). --- The PoC triggers a pool buffer overflow in win32k!vSolidFillRect. ​When using Special Pool we get the crash immediately on the overwrite. Without Special Pool we often get a crash in the same function, but sometimes it crashes in a different function (similar to another issue, however with a different offset). This might be a result of the memory corruption or an out-of-memory condition before the overflow is triggered. Debugger output for all three different crashes attached. --- This bug is subject to a 90 day disclosure deadline. If 90 days elapse without a broadly available patch, then the bug report will automatically become visible to the public.
Comment 1
by
cevans@google.com,
Mar 31 2015
,
Jun 4 2015
Same root cause as https://code.google.com/p/google-security-research/issues/detail?id=312, according to Microsoft. CVE shared.
,
Jun 9 2015
,
Sep 21 2015
|
||||
| ► Sign in to add a comment | ||||