Vigil@nce: Windows, privilege elevation
February 2010 by Vigil@nce
SYNTHESIS OF THE VULNERABILITY
A local attacker can force a double memory free in the kernel, and
can use it to gain system privileges.
Severity: 2/4
Consequences: administrator access/rights
Provenance: user shell
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: high (3/3)
Creation date: 10/02/2010
IMPACTED PRODUCTS
– Microsoft Windows 2000
– Microsoft Windows 2003
– Microsoft Windows 2008
– Microsoft Windows 7
– Microsoft Windows Vista
– Microsoft Windows XP
DESCRIPTION OF THE VULNERABILITY
The kernel is run with elevated privileges.
A local attacker can force a double memory free in the kernel, and
can use it to gain system privileges.
Technical details are unknown.
CHARACTERISTICS
Identifiers: 977165, BID-38044, CVE-2010-0233, MS10-015,
VIGILANCE-VUL-9433
http://vigilance.fr/vulnerability/Windows-privilege-elevation-9433