Security News Another Windows 0-day flaw has been published on Twitter

Solarquest

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 22, 2014
2,525
....

SandboxEscaper, a researcher who back in August tweeted out a Windows privilege escalation bug, has published another unpatched Windows flaw on Twitter.

The new bug has some similarities to the previous bug. Windows services usually run with elevated privileges. Sometimes they perform actions on behalf of a user, and to do this they use a feature called impersonation. These services act as if they were using a particular user's set of privileges. After they've finished that action, they revert to their normal, privileged identity.

Both this bug and SandboxEscaper's previous bug depend on improper use of impersonation—specifically, the services in question (last time it was Task Scheduler, this time it's the "Data Sharing Service") revert their impersonation too quickly and end up performing some actions with elevated privileges when they should in fact have been impersonated. The last bug allowed one file to be written over another. In this case, it's a call to delete a file that is improperly impersonated, ultimately giving regular unprivileged user the ability to delete any file on the system, even those that they should have no access to.

The new bug appears to have an important timing aspect to it; two actions must happen simultaneously to make the impersonation end prematurely. SandboxEscaper says that because of this, exploitation on a single core machine seems unlikely, but multicore machines are vulnerable. SandboxEscaper's proof of concept, published on GitHub, will attempt to delete Windows' PCI driver. As such, we wouldn't recommend running it on any system that you care about because it's not going to be able to boot once that file has been removed.
....
 
E

Eddie Morra

Really talented researcher but he/she needs to get some help and sort himself/herself out because he/she is throwing away their talent!

There's many companies who will buy vulnerabilities and use them for security research purposes... Look into Zerodium and the Trend-Micro vulnerability programme.

It's a shame but if they keep showing untrustworthy behaviour by recklessly outing zero-days on Twitter then they may be black-listed from working at many enterprise-environments for cyber-security/vulnerability research because no one will trust him/her, which would be a shame when obviously they have good skill for this line of work.
 

Solarquest

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 22, 2014
2,525

vtqhtr413

Level 26
Verified
Top Poster
Well-known
Aug 17, 2017
1,515
Seams 0patch already have a fix for this but personal I'm a bit careful with there software as I don't fully trust it.



Nice find @upnorth , here is an update from that same source

 

Attachments

  • DqWJVifX0AAISBF.jpg
    DqWJVifX0AAISBF.jpg
    131.4 KB · Views: 225
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top