Nytro Posted November 1, 2014 Report Posted November 1, 2014 AFD.SYS DANGLING POINTER VULNERABILITYPwn2Own 2014TABLE OF CONTENTSAffected OS ......................................................................................................................................................................... 2Overview ............................................................................................................................................................................. 2Impact ................................................................................................................................................................................. 2Technical Analysis ............................................................................................................................................................... 3POC code ......................................................................................................................................................................... 3Vulnerability Analysis ...................................................................................................................................................... 4Step 1 - IOCTL 0x1207f ................................................................................................................................................ 5Step 2 - IOCTL 0x120c3 ............................................................................................................................................... 8Exploitation ..................................................................................................................................................................... 9READ-/WRITE-Primitives through WorkerFactory Objects ....................................................................................... 10Controlled Data on NonPagedPoolNx Pool ............................................................................................................... 11Leak Target ............................................................................................................................................................... 12Single-Gadget-ROP for SMEP Evasion ....................................................................................................................... 12Shellcode ................................................................................................................................................................... 13Putting it all together ................................................................................................................................................ 13Patch Analysis ................................................................................................................................................................... 14Download: http://www.siberas.de/papers/Pwn2Own_2014_AFD.sys_privilege_escalation.pdf Quote