Microsoft Windows USB RNDIS Overflow

2013.03.19
Credit: Andy Davis
Risk: High
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

High Risk Vulnerability in Microsoft Windows 18 March 2013 Andy Davis of NCC Group has discovered a High risk vulnerability in Microsoft Windows Impact: Windows USB RNDIS driver kernel pool overflow. Exploitation would result in local privilege escalation Versions affected: Microsoft Windows (all current versions apart from RT) Details of the patch can be found at the following URL: http://technet.microsoft.com/en-us/security/bulletin/ms13-027 NCC Group is going to withhold details of this flaw for three months. This three month window will allow users the time needed to apply the patch before the details are released to the general public. This reflects the NCC Group approach to responsible disclosure. NCC Group Research http://www.nccgroup.com/research For more information please visit <a href="http://www.mimecast.com">http://www.mimecast.com<br> This email message has been delivered safely and archived online by Mimecast. </a>

References:

http://www.nccgroup.com/research
http://technet.microsoft.com/en-us/security/bulletin/ms13-027


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top