Google publishes third Windows 0-day vulnerability in a month
// CSO Online
Google ignored Microsoft's calls for flexible vulnerability disclosure deadlines and released details of another unpatched Windows flaw, leaving users exposed for at least the next 25 days.
The new vulnerability, which was confirmed on Windows 7 and 8.1, might constitute a security feature bypass for the way applications can encrypt their memory so that data can be exchanged between processes running under the same logon session.
"The issue is the implementation in CNG.sys doesn't check the impersonation level of the token when capturing the logon session id (using SeQueryAuthenticationIdToken) so a normal user can impersonate at Identification level and decrypt or encrypt data for that logon session," the Google Project Zero researchers said in a description of the flaw. "This might be an issue if there's a service which is vulnerable to a named pipe planting attack or is storing encrypted data in a world readable shared memory section."
Shared via my feedly reader
Sent from my iPhone
Data Center Engineer
1801 Superior Ave. Ste. 300 | Cleveland, OH 44114
(800) 777-7178 | toll free
(440) 268-3297 | office
(216) 224-5769 | mobile
Architects of the anyplace workspace™