|
|
Kernel-mode type-confusion vulnerability via NtUserSetInformationThread/UserThreadCsrApiPort | |
| Reported by matttait@google.com, Jun 9 2015 | Back to list | |
The Windows Kernel is subject to a kernel-mode type-confusion vulnerability inside win32k!NtUserSetInformationThread due to referencing a user-mode handle via ObReferenceObjectByHandle with a "NULL" type specified (it should instead be using *LpcPortObjectType to protect against this vulnerability). This vulnerability can be triggered from inside CSRSS via the syscall win32k!NtUserSetInformationThread with ThreadInformationClass set to "UserThreadCsrApiPort" and the parameter of the syscall set to a HANDLE that is not an LPC object. This bug is subject to a 90 day disclosure deadline. If 90 days elapse without a broadly available patch, then the bug report will automatically become visible to the public.
Comment 1
by
matttait@google.com,
Sep 2 2015
,
Sep 9 2015
Looks like this won't get fixed in a bulletin, but may be addressed in a future version (based on a mail from MSRC on Sep 2). Note that this issue is a kernel driver signing bypass from Administrator privileges, i.e. it would typically be used as the final stage in an exploit chain that would already have given Administrator access, rather than as a standalone exploit. |
||
| ► Sign in to add a comment | ||