Windows Kernel 64-bit stack memory... CVE-2018-0896 CNNVD-201803-506

1.9 AV AC AU C I A
发布: 2018-03-14
修订: 2018-04-05

We have discovered that the msrpc!LRPC_CASSOCIATION::AlpcSendCancelMessage function sends an ALPC message with portions of uninitialized memory from the local stack frame on Windows 7 64-bit (other versions were not tested). The message is 0x18 bytes long, 8 of which are uninitialized. The layout of the memory area is as follows: ``` 00000000: 00 00 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 ................ 00000010: 00 00 00 00 ff ff ff ff ?? ?? ?? ?? ?? ?? ?? ?? ................ ``` Where 00 denote bytes which are properly initialized, while ff indicate uninitialized values. This buffer can be then read back into user-mode with e.g. the nt!NtAlpcSendWaitReceivePort syscall, as observed during system runtime on our test machine: ``` kd> k # Child-SP RetAddr Call Site 00 fffff880`0220ea58 fffff800`029a0478 nt!memcpy+0x3 01 fffff880`0220ea60 fffff800`029a253e nt!AlpcpReceiveMessage+0x3c5 02 fffff880`0220eb00 fffff800`0268d093 nt!NtAlpcSendWaitReceivePort+0x1fe 03 fffff880`0220ebb0...

0%
暂无可用Exp或PoC
当前有14条受影响产品信息