Vigil@nce - Windows: privilege escalation via RPC
August 2013 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can send an asynchronous RPC message to Windows,
in order to escalate his privileges.
Impacted products: Windows 2003, Windows 2008, Microsoft Windows
2012, Windows 7, Windows 8, Windows RT, Windows Vista, Windows XP
Severity: 2/4
Creation date: 13/08/2013
DESCRIPTION OF THE VULNERABILITY
The RPC (Remote Procedure Call) feature allows a process to query
another process.
However, a local attacker can send an asynchronous RPC message to
Windows, in order to escalate his privileges.
Technical details are unknown.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Windows-privilege-escalation-via-RPC-13275