Windows Kernel 64-bit stack memory... CVE-2018-0814 CNNVD-201803-530

2.1 AV AC AU C I A
发布: 2018-03-14
修订: 2020-08-24

We have discovered that the win32k!PROXYPORT::SendRequest function sends ALPC messages with portions of uninitialized memory from the local stack frame on Windows 7 64-bit (other versions were not tested). The message is 0x20 bytes long, 8 of which are uninitialized. The layout of the memory area is as follows: ``` 00000000: 00 00 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 ................ 00000010: 00 00 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 ................ ``` Where 00 denote bytes which are properly initialized, while ff indicate uninitialized values. Based on a brief analysis of the win32k!PROXYPORT::SendRequest function code, we suspect that the memory region is in fact a structure, where the 1st and 3rd fields are 32-bit wide, while the 2nd and 4th fields are 64-bit wide (e.g. pointers). Such layout would cause the compiler to insert the two 4-byte padding holes, in order to align the 64-bit fields to 8-byte boundaries. This would also explain why the bug hasn't...

0%
当前有1条漏洞利用/PoC
当前有14条受影响产品信息