Google researcher reveals another Windows 0-day
Posted on 23 May 2013.
Tavis Ormandy - the Google researcher known for discovering a slew of Windows, Java and Flash Player vulnerabilities and zero-days and his combative attitude regarding the "responsible disclosure" policy preferred by software companies - has been working on exploiting another Windows zero-day vulnerability and asking for assistance on the Full Disclosure mailing list.


He's been working on it for months, and according to a later post, he has now a working exploit that "grants SYSTEM on all currently supported versions of Windows."

According to Computerworld's Gregg Keizer, Microsoft has confirmed that they have been mare aware of the issue, and are currently investigating it. Luckily, it is not being exploited in the wild as of yet.

According to Secunia, it is a potential privilege escalation vulnerability that could also be used to execute arbitrary code on the target system or DoS it, and affects fully patched Windows 7 and reportedly also Windows 8, but can be taken advantage of only by attackers that have physical access to the machine.









Spotlight

Compromised cPanel "Account Suspended" pages redirect to exploit kit

The code redirects visitors to another URL where the Fiesta exploit kit is hosted, which then tries to detect and exploit several vulnerabilities in various software. If it succeeds, the visitors are saddled with a banking Trojan.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Feb 27th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //