Advisory Details

May 10th, 2016

(Pwn2Own) Microsoft Windows dxgkrnl Kernel Driver Buffer Overflow Privilege Escalation Vulnerability

ZDI-16-284
ZDI-CAN-3627

CVE ID CVE-2016-0176
CVSS SCORE 6.9, AV:L/AC:M/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Microsoft
AFFECTED PRODUCTS Windows
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['24550']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within processing of the DirtyRegions structure. A buffer overflow vulnerability occurs when NumRects is larger than D3DKMT_MAX_PRESENT_HISTORY_RECTS. An attacker can leverage this vulnerability to escalate privileges and execute code under the context of SYSTEM.

ADDITIONAL DETAILS Microsoft has issued an update to correct this vulnerability. More details can be found at:
https://technet.microsoft.com/en-us/library/security/ms16-052.aspx
DISCLOSURE TIMELINE
  • 2016-03-12 - Vulnerability reported to vendor
  • 2016-05-10 - Coordinated public release of advisory
CREDIT Peter Hlavaty
Daniel King of KeenLab
Tencent
BACK TO ADVISORIES