Advisory Details

May 10th, 2016

(Pwn2Own) Microsoft Windows win32kfull.sys Surface Object Use-After-Free Privilege Escalation Vulnerability

ZDI-16-279
ZDI-CAN-3615

CVE ID CVE-2016-0173
CVSS SCORE 6.6, AV:L/AC:M/Au:S/C:C/I:C/A:C
AFFECTED VENDORS Microsoft
AFFECTED PRODUCTS Windows
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['24543']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within how win32kfull.sys handles reference counting of Surface objects. An attacker can leverage this vulnerability to escalate privileges and execute code with kernel privileges.

ADDITIONAL DETAILS Microsoft has issued an update to correct this vulnerability. More details can be found at:
https://technet.microsoft.com/en-us/library/security/ms16-062.aspx
DISCLOSURE TIMELINE
  • 2016-03-12 - Vulnerability reported to vendor
  • 2016-05-10 - Coordinated public release of advisory
CREDIT 360Vulcan
BACK TO ADVISORIES