Full Disclosure mailing list archives
Re: [SEC-LABS] Win32 Device Drivers Communication ...
From: psz () maths usyd edu au (Paul Szabo)
Date: Sun, 3 Aug 2003 14:18:10 +1000 (EST)
The Sec-Labs security research group found a bug in Win32 Device Drivers Communication, the white-paper for this vulnerability can be viewed at http://sec-labs.hack.pl , the exploit code for Symantec Norton AntiVirus '2002 (probably all versions) Device Driver is also stored at our homepage. The full link to the white paper: http://sec-labs.hack.pl/papers/win32ddc.php
Two questions: Can this problem be classified as a "shatter" attack? The similarity I see is that Windows takes an address and does things with it without any checks. Could other drivers (part of a "standard" Windows install) be exploited? Maybe the CON: driver where we have some control over the output? I apologize if these are "stupid" questions. Thanks, Paul Szabo - psz () maths usyd edu au http://www.maths.usyd.edu.au:8000/u/psz/ School of Mathematics and Statistics University of Sydney 2006 Australia _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Re: [SEC-LABS] Win32 Device Drivers Communication ... Paul Szabo (Aug 02)