Jump to content
Nytro

AFD.SYS DANGLING POINTER VULNERABILITY

Recommended Posts

Posted

AFD.SYS DANGLING POINTER VULNERABILITY

Pwn2Own 2014

TABLE OF CONTENTS
Affected OS ......................................................................................................................................................................... 2
Overview ............................................................................................................................................................................. 2
Impact ................................................................................................................................................................................. 2
Technical Analysis ............................................................................................................................................................... 3
POC code ......................................................................................................................................................................... 3
Vulnerability Analysis ...................................................................................................................................................... 4
Step 1 - IOCTL 0x1207f ................................................................................................................................................ 5
Step 2 - IOCTL 0x120c3 ............................................................................................................................................... 8
Exploitation ..................................................................................................................................................................... 9
READ-/WRITE-Primitives through WorkerFactory Objects ....................................................................................... 10
Controlled Data on NonPagedPoolNx Pool ............................................................................................................... 11
Leak Target ............................................................................................................................................................... 12
Single-Gadget-ROP for SMEP Evasion ....................................................................................................................... 12
Shellcode ................................................................................................................................................................... 13
Putting it all together ................................................................................................................................................ 13
Patch Analysis ................................................................................................................................................................... 14

Download: http://www.siberas.de/papers/Pwn2Own_2014_AFD.sys_privilege_escalation.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...