Subscribe via feed.

Windows User Mode Font Driver Thread Permissions EoP

Posted by deepcore on September 20, 2015 – 6:06 am

The host process for the UMFD runs as a normal user but with a heavily restrictive process DACL. It’s possible execute arbitrary code within the context of the process because it’s possible to access the processes threads leading to local EoP.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.