Closed GoogleCodeExporter closed 8 years ago
Communication history for this bug:
Jun11 [Day 0]: Me -> MSRC Initial report
Jun12 [Day 1]: MSRC -> Me MSRC issues tracking number 30430 to track this
issue
Aug27 [Day 76]: Me -> MSRC Request for additional feedback on whether
Microsoft intends to patch the issue prior to the 90 day deadline.
Sep03 [Day 84]: MSRC -> Me (10:20:45 PST) Microsoft responds "We have
completed our investigations and have determined that the reported bug can be
triggered only through CSRSS which is a privileged process, and requires admin
to kernel elevation which is not considered as a security boundary"
Sep03 [Day 84]: MSRC -> Me (17:24:30 PST) Microsoft sends a second email
asking for acknowledgement of their previous email.
Sep04 [Day 85]: Me -> MSRC Request for Microsoft to provide date on which
their internal investigation stopped.
Sep08 [Day 89]: MSRC -> Me Microsoft states "We tried reproducing this issue
at our end in June and investigated this report during July and August
time-frame"
Original comment by mattt...@google.com
on 10 Sep 2015 at 2:47
Note that this issue is a kernel driver signing bypass from Administrator
privileges, i.e. it would typically be used as the final stage in an exploit
chain that would already have given Administrator access, rather than as a
standalone exploit.
Matt still has a lingering suspicion that this can be triggered from a
non-Admin user (as described in the initial report), but after a fairly
substantial investigation we haven't established this definitively.
Original comment by haw...@google.com
on 11 Sep 2015 at 12:10
Original issue reported on code.google.com by
mattt...@google.com
on 12 Jun 2015 at 2:00