Windows: splWOW64 Elevation of Privilege
Platform: Windows 10 2004 (19041.508)
Class: Elevation of PrivilegeSummary: CVE-2020-0986, which was exploited in the wild[1] was not fixed. The vulnerability still exists, just the exploitation method had to change.
A low integrity process can send LPC messages to splwow64.exe (Medium integrity) and gain a write-what-where primitive in splwow64’s memory space. The attacker controls the destination, the contents that are copied, and the number of bytes copied through a memcpy call. The offset for the destination pointer calculation is only constrained to be:
Offset <= 0x7FFFFFFF
Offset + perceived size of structure <= 0x7FFFFFFFSplwow64 passes the LPC message to GdiPrinterThunk. The vulnerable memcpy is in message 0x6D. …
-
Project Zero : Windows: splWOW64 Elevation of Privilege
- This topic has 3 replies, 4 voices, and was last updated 4 years, 5 months ago.
AuthorViewing 2 reply threadsAuthorViewing 2 reply threads