Google has disclosed details of a new zero-day privilege escalation flaw in the Windows operating system that’s being actively exploited in the wild.
The elevation of privileges (EoP) vulnerability, tracked as CVE-2020-17087, concerns a buffer overflow present since at least Windows 7 in the Windows Kernel Cryptography Driver (“cng.sys”) that can be exploited for a sandbox escape.
“The bug resides in the cng!CfgAdtpFormatPropertyBlock function and is caused by a 16-bit integer truncation issue,” Google’s Project Zero researchers Mateusz Jurczyk and Sergei Glazunov noted in their technical write-up.
Project Zero has shared a proof-of-concept exploit (PoC) that can be used to corrupt kernel data and crash vulnerable Windows devices even under default system configurations.
What’s notable is that the exploit chain requires linking CVE-2020-17087 with another Chrome browser zero-day (CVE-2020-15999) that was fixed by Google last week.
The Chrome zero-day involves a heap buffer overflow in the Freetype font library to run malicious code in the browser, but the newly revealed Windows zero-day makes it possible for an attacker to break out of Chrome’s sandbox protections and run the code on Windows — also called a sandbox escape.
Stating that the exploitation is “not related to any US election-related targeting,” Project Zero’s Ben Hawkes said a patch for the flaw is expected to be released by Microsoft on November 10.
Hawkes also defended the practice of disclosing zero-days within a week of them being actively exploited.
“We think there’s defensive utility to sharing these details, and that opportunistic attacks using these details between now and the patch being released is reasonably unlikely (so far it’s been used as part of an exploit chain, and the entry-point attack is fixed),” he said.
“The short deadline for in-the-wild exploit also tries to incentivize out-of-band patches or other mitigations being developed/shared with urgency. Those improvements you might expect to see over a longer term period,” Hawkes added.
Article Provided By: The Hacker News
If you would like liquidvideotechnologies.com to discuss developing your Home Security System, Networking, Access Control, Fire, IT consultant or PCI Compliance, please do not hesitate to call us at 864-859-9848 or you can email us at firstname.lastname@example.org.