Closed GoogleCodeExporter closed 9 years ago
Correspondence Date: 30 Jan 2015
> Microsoft assigned MSRC case 21444 to this issue
Original comment by fors...@google.com
on 30 Jan 2015 at 6:22
Confirmed Win10 TP build 9926 is also vulnerable
Original comment by fors...@google.com
on 3 Feb 2015 at 9:23
Some further notes on exploitability. This is theoretically exploitable from a
heavily restricted sandbox. Even though it isn't possible to write to the
current user's DosDevices directory from say IE EPM, Chrome or Adobe sandbox
you can instead do the same thing on a per-process basis by calling
NtSetInformationProcess with the ProcessDeviceMap info class to set the
process's DosDevices object directory. You can use an unnamed object directory,
created by calling NtCreateDirectoryObject and add the symlink using
NtCreateSymbolicLinkObject using the unnamed directory handle as the base. You
would still need to be able to open a file object (it doesn't seem to bypass
access check) but you could point the open to a named device object which will
open from the low privileged sandbox, such as \Device\Afd\XXXX.
Original comment by fors...@google.com
on 4 Feb 2015 at 2:43
Original comment by fors...@google.com
on 14 Apr 2015 at 1:28
Fixed in https://technet.microsoft.com/library/security/MS15-038
Original comment by fors...@google.com
on 14 Apr 2015 at 5:41
Original comment by fors...@google.com
on 16 Apr 2015 at 10:10
Original comment by fors...@google.com
on 21 Apr 2015 at 9:45
Original issue reported on code.google.com by
fors...@google.com
on 30 Jan 2015 at 6:05Attachments: