Nytro Posted February 27, 2013 Report Posted February 27, 2013 Kernel Attacks Through User-Mode CallbacksAuthored by Tarjei MandtIn this paper, the author discusses the many challenges and problems concerning user-mode callbacks in win32k. In particular, they show how win32k's dependency on global locks in providing a thread-safe environment does not integrate well with the concept of user-mode callbacks. Although many vulnerabilities related to user-mode callbacks have been addressed, their complex nature suggests that more subtle flaws might still be present in win32k. Thus, in an effort to mitigate some of the more prevalent bug classes, they conclusively provide some suggestions as to how users may protect themselves against future kernel attacksDownload:http://dl.packetstormsecurity.net/papers/win/mandt-win32k-paper.pdfSursa: Kernel Attacks Through User-Mode Callbacks ? Packet Storm Quote