25.03.2017 Views

LPE vulnerabilities exploitation on Windows 10 Anniversary Update

Win10LPE

Win10LPE

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Usage of GDI objects addresses<br />

How attackers used GDI kernel objects addresses during <str<strong>on</strong>g>exploitati<strong>on</strong></str<strong>on</strong>g> ?<br />

More stable <str<strong>on</strong>g>exploitati<strong>on</strong></str<strong>on</strong>g>:<br />

1) It is possible to check if object was allocated <strong>on</strong> the right place after spray.<br />

2) It is possible to change memory layout as necessary.<br />

Arbitrary read/write:<br />

1) It is possible to change different fields of Bitmap (SURFACE in kernel) and<br />

gain arbitrary read and write.<br />

We can use GDI objects for <str<strong>on</strong>g>exploitati<strong>on</strong></str<strong>on</strong>g> even if we have vulnerability in<br />

different (not win32k) system comp<strong>on</strong>ent.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!