Google researcher reveals another Windows 0-day
Posted on 23 May 2013.
Tavis Ormandy - the Google researcher known for discovering a slew of Windows, Java and Flash Player vulnerabilities and zero-days and his combative attitude regarding the "responsible disclosure" policy preferred by software companies - has been working on exploiting another Windows zero-day vulnerability and asking for assistance on the Full Disclosure mailing list.


He's been working on it for months, and according to a later post, he has now a working exploit that "grants SYSTEM on all currently supported versions of Windows."

According to Computerworld's Gregg Keizer, Microsoft has confirmed that they have been mare aware of the issue, and are currently investigating it. Luckily, it is not being exploited in the wild as of yet.

According to Secunia, it is a potential privilege escalation vulnerability that could also be used to execute arbitrary code on the target system or DoS it, and affects fully patched Windows 7 and reportedly also Windows 8, but can be taken advantage of only by attackers that have physical access to the machine.









Spotlight

Chrome extension thwarts user profiling based on typing behavior

Infosec consultant Paul Moore came up with a working solution to thwart a type of behavioral profiling. The result is a Chrome extension called Keyboard Privacy, which prevents profiling of users by the way they type by randomizing the rate at which characters reach the DOM.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Wed, Jul 29th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //