Sign up for our weekly newsletter!
REGISTER NOW |
||
|
||
Older Versions of Windows at Risk From New Zero-Day Exploit![]() Larry Loeb, Author, 7/12/2019
Cybersecurity firm ESET discovered a Windows zero-day exploit that affects older systems like Windows 7 and Server 2008. Called CVE-2019-1132, it is a privilege escalation issue linked to how the Win32k tool handles objects in memory. The upshot of all of this is that it can be exploited in order to execute arbitrary code in kernel mode. ESET published a blog about the problem. ESET first saw the attack in June when it was used in an attack of a government institution in eastern Europe. The attack was attributed by ESET to the Buhtrap group of threat actors, who are thought to be Russian in origin and had previously been active in financial crimes since 2014. The exploit creates two windows. For the first window, it creates popup menu objects and appends menu items using the CreatePopupMenu and AppendMenu functions. In addition, the exploit sets up WH_CALLWNDPROC and EVENT_SYSTEM_MENUPOPUPSTART hooks. The exploit then displays a menu using the TrackPopupMenu function. The exploit needs to catch the moment in time when the initial menu is already created, but the sub-menu is going to be created. For that, the exploit has code that handles the WM_NCCREATE message in the WH_CALLWNDPROC hook. When the exploit code detects the system is in this state, it sends a MN_CANCELMENUS (0x1E6) message to the first menu, which cancels that menu. However, its sub-menu is still about to be created. Now, the attackers use the second window to continue the process. The main exploit goal is to flip the bServerSideWindowProc bit in the tagWND structure of the second window. The exploit can then send a specific message to the second window in order to execute WndProc in kernel mode. As a final step, the exploit will replace the token of the current process with the system token. ESET notes that, “The exploit only works against older versions of Windows, because since Windows 8 a user process is not allowed to map the NULL page. Microsoft back-ported this mitigation to Windows 7 for x64-based systems.” ESET reported the situation to Microsoft, which issued a patch for it in the July 2019 Patch Tuesday updates. Legacy, unmatched systems will be vulnerable to the exploit. Upgrading to a newer OS will eliminate this particular vulnerability. — Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek. |
The Federal Bureau of Investigation's office in Portland, Ore., uses 'Tech Tuesday' to offer IoT security advice.
One of the most prevalent threats to the financial sector, the Dridex Trojan, was the subject of a recent alert.
Aviatrix, an enterprise VPN company with customers that include NASA, Shell and BT, has recently dealt with a vulnerability that was uncovered by Immersive Labs researcher and content engineer Alex Seymour.
Security firm CyberArk is now finally able to discuss a major OAuth 2.0 vulnerability that affects Microsoft Azure web services.
Be alert, be aware, and be careful about what you reveal of your company's internal processes on social media.
Information Resources
upcoming Webinars
ARCHIVED
Top Tips for Blocking pwned [email protected]$$wOrds in Your Organization
Tuesday, October 29, 2019
12 p.m. New York/ 4:00 p.m. London Podcasts
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Podcast: Digital Transformation, SD-WAN & Optimal Security
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security. ![]() like us on facebook
|
|
![]() |
||
![]() |
Security Now
About Us
Contact Us
Help
Register
Events
Supporting Partners
Twitter
Facebook
RSS
Copyright © 2019 Light Reading, part of Informa Tech, a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use in partnership with
|