Jump to content

Recommended Posts

Posted

A group security researchers has succeeded to bypass important security measures of Windows by changing just 1 bit. The problem in the Windows kernel exists in all Windows versions, including Windows 10 Technical Preview.

Microsoft has added several additional security measures to the Windows kernel over the years. These measures should make it harder for attackers to abuse possible leaks in the operating system and include Kernel DEP (ensures that most kernel data regions cannot be executed), KASLR (randomizes the kernel address-space to avoid figuring out where kernel modules exist), SMEP (prevents execution control transfers between kernel mode to user-mode) and Mitigation Of Common Attack Vectors (hardens commonly abused structures).

The discovered leak makes it possible for an attacker with access to a system to bypass all these Windows security measures and more. An exploit developed by the researchers changes a single bit to abuse the leak.

Microsoft was informed about the issue several months ago and patched the leak yesterday. The leak, demonstrated in this movie, allows an attacker to escalate privileges on a system, according to the description of Microsoft.

The researchers state they’ve demonstrated that even a small bug can provide full control over Windows, “nevertheless, we think that Microsoft efforts to make the its operating system more secure raised the bar significantly and made writing reliable exploits far harder than before.”

Unfortunately these measures won’t fully protect against attackers. Also cybercriminals will eventually develop similar exploits, according to the researchers.

 

Windows_logo_Cyan_rgb_D.png

 

Source : myce.com

 

Now I'm really scared ...

How about you guys ?

Posted

the term 'leak' is used in a really wrong way :))

 

 

Also, stuff like this is discovered all the time. Nothing really shocking.. The attacker needs access to the machine in order for the exploit to work, so it's not that bad.

Windows recently patched another vulnerability regarding group policies: https://technet.microsoft.com/en-us/library/security/ms15-011.aspx

That patch took Microsoft 13 months to make (and test) because it was a flaw in the design of a protocol, not an implementation problem.

love is a verb
Love is a doing word

  • 2 months later...

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.