Описание
The Graphics Rendering Engine in Microsoft Windows 2000 through 2000 SP4 and Windows XP through SP2 maps GDI Kernel structures on a global shared memory section that is mapped with read-only permissions, but can be remapped by other processes as read-write, which allows local users to cause a denial of service (memory corruption and crash) and gain privileges by modifying the kernel structures.
The Graphics Rendering Engine in Microsoft Windows 2000 through 2000 SP4 and Windows XP through SP2 maps GDI Kernel structures on a global shared memory section that is mapped with read-only permissions, but can be remapped by other processes as read-write, which allows local users to cause a denial of service (memory corruption and crash) and gain privileges by modifying the kernel structures.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-5758
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-017
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30042
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2056
- http://kernelwars.blogspot.com/2007/01/alive.html
- http://projects.info-pull.com/mokb/MOKB-06-11-2006.html
- http://secunia.com/advisories/22668
- http://securitytracker.com/id?1017168
- http://www.blackhat.com/html/bh-europe-07/bh-eu-07-speakers.html#Eriksson
- http://www.securityfocus.com/archive/1/466186/100/200/threaded
- http://www.securityfocus.com/bid/20940
- http://www.vupen.com/english/advisories/2006/4358
- http://www.vupen.com/english/advisories/2007/1215
Связанные уязвимости
The Graphics Rendering Engine in Microsoft Windows 2000 through 2000 SP4 and Windows XP through SP2 maps GDI Kernel structures on a global shared memory section that is mapped with read-only permissions, but can be remapped by other processes as read-write, which allows local users to cause a denial of service (memory corruption and crash) and gain privileges by modifying the kernel structures.