Vigil@nce - Windows: information disclosure on kernel memory
June 2013 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can trigger an error in the Windows kernel, in
order to obtain sensitive information.
Impacted products: Windows 2003, Windows 2008, Microsoft Windows
2012, Windows 7, Windows 8, Windows Vista, Windows XP
Severity: 1/4
Creation date: 11/06/2013
DESCRIPTION OF THE VULNERABILITY
The Windows kernel uses an address space which is unknown by local
users, so attacks using memory corruptions are harder to exploit.
However, a local attacker can use a system call, and force a
memory page fault, to obtain kernel memory addresses.
A local attacker can therefore trigger an error in the Windows
kernel, in order to obtain sensitive information.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Windows-information-disclosure-on-kernel-memory-12964