Vigil@nce - Windows: privilege elevation via TCP/IP
August 2010 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/
SYNTHESIS OF THE VULNERABILITY
A local attacker can use a vulnerability of the Windows
implementation of TCP/IP, in order to elevate his privileges.
Severity: 2/4
Creation date: 11/08/2010
DESCRIPTION OF THE VULNERABILITY
Sockets of the Windows TCP/IP stack can be controlled via the
WSAIoctl() function.
The SIO_ADDRESS_LIST_SORT ioctl sort addresses, by calling the
IppSortDestinationAddresses() function. However, if a parameter of
IppSortDestinationAddresses is too high, an integer overflow
occurs and leads to a memory corruption.
A local attacker can therefore use the SIO_ADDRESS_LIST_SORT
ioctl, in order to elevate his privileges.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Windows-privilege-elevation-via-TCP-IP-9834