Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce - Windows: privilege elevation via TCP/IP

August 2010 by Vigil@nce

This bulletin was written by Vigil@nce : http://vigilance.fr/

SYNTHESIS OF THE VULNERABILITY

A local attacker can use a vulnerability of the Windows
implementation of TCP/IP, in order to elevate his privileges.

Severity: 2/4

Creation date: 11/08/2010

DESCRIPTION OF THE VULNERABILITY

Sockets of the Windows TCP/IP stack can be controlled via the
WSAIoctl() function.

The SIO_ADDRESS_LIST_SORT ioctl sort addresses, by calling the
IppSortDestinationAddresses() function. However, if a parameter of
IppSortDestinationAddresses is too high, an integer overflow
occurs and leads to a memory corruption.

A local attacker can therefore use the SIO_ADDRESS_LIST_SORT
ioctl, in order to elevate his privileges.

ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN

http://vigilance.fr/vulnerability/Windows-privilege-elevation-via-TCP-IP-9834


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts