Microsoft Windows Kernel bind() Out-Of-Bounds Read
Posted by deepcore on May 17, 2017 – 11:15 am
Two related bugs have been discovered in the Microsoft Windows kernel code responsible for implementing the bind() socket function, specifically in the afd!AfdBind and tcpip!TcpBindEndpoint routines. They both can lead to reading beyond the allocated pool-based buffer memory area, potentially allowing user-mode applications to disclose kernel-mode secrets. They can also be exploited to trigger a blue screen of death and therefore a denial of service condition.
Post a reply
You must be logged in to post a comment.