New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.
Starred by 1 user
Status: Fixed
Owner:
Closed: Nov 2015
Cc:



Sign in to add a comment
Windows ndis.sys IOCTL 0x170034 (ndis!ndisNsiGetIfNameForIfIndex) pool buffer overflow
Project Member Reported by hawkes@google.com, Sep 4 2015 Back to list
Credit is to "Nils Sommer of bytegeist, working with Google Project Zero".

---
The attached testcase crashes Windows 7 32-bit due to a pool buffer overflow in an ioctl handler. Enabling special on ndis.sys netio.sys and ntoskrnl helps to track down the issue, however it will crashes due to a bad pool header without special pool as well.
---

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without a broadly available patch, then the bug report will automatically
become visible to the public.

 
crash_bad_pool_header.txt
50.7 KB View Download
poc.cpp
2.5 KB Download
crash_special_pool.txt
57.6 KB View Download
Project Member Comment 1 by hawkes@google.com, Sep 4 2015
Summary: Windows ndis.sys IOCTL 0x170034 (ndis!ndisNsiGetIfNameForIfIndex) pool buffer overflow (was: ndis.sys IOCTL 0x170034 (ndis!ndisNsiGetIfNameForIfIndex) pool buffer overflow)
Project Member Comment 2 by hawkes@google.com, Sep 5 2015
Labels: MSRC-31101
Project Member Comment 3 by hawkes@google.com, Sep 17 2015
Issue 517 has been merged into this issue.
Project Member Comment 4 by hawkes@google.com, Nov 20 2015
Labels: -Restrict-View-Commit CVE-2015-6098
Status: Fixed
Fixed in MS15-117.
Sign in to add a comment