Advisory Details

October 30th, 2019

(0Day) Microsoft Windows cdrom Driver Memory Corruption Denial-of-Service Vulnerability

ZDI-19-924
ZDI-CAN-9381

CVE ID
CVSS SCORE 6.5, AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
AFFECTED VENDORS Microsoft
AFFECTED PRODUCTS Windows
VULNERABILITY DETAILS

This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the cdrom.sys driver. A crafted request with an IOCTL of 0x56C008 or 0x56C064 can trigger a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

ADDITIONAL DETAILS

This vulnerability is being disclosed publicly without a patch in accordance with ZDI policies.

10/03/19 - ZDI reported the vulnerability to the vendor
10/03/19 - The vendor acknowledged reception of the case
10/14/19 - The vendor communicated that the case does not meet the bar for servicing
10/21/19 - ZDI communicated to the vendor the intention to 0-day the case on 10/30/19

-- Mitigation:
Given the nature of the vulnerability the only salient mitigation strategy is to restrict interaction with the application to trusted files.


DISCLOSURE TIMELINE
  • 2019-10-03 - Vulnerability reported to vendor
  • 2019-10-30 - Coordinated public release of advisory
CREDIT Meysam Firouzi of STAR Labs
BACK TO ADVISORIES