Her researchers ESET recently discovered and analyzed an exploit for an "0day" attack technique in a highly targeted Eastern European attack.
The exploit was based on the use of a Local Privilege Escalation (LPE) vulnerability in the Microsoft Windows operating system. ESET immediately reported the issue to the Microsoft Security Response Center, which in turn fixed the vulnerability and issued a patch.

Only some limited versions of Windows are affected by this exploit, as in Windows 8 and in later versions, a user process can not connect to a NULL page, a parameter that is required to initiate and succeed the attack.
This vulnerability of Windows Win32k.sys, like the others, uses the popup menu.
“For example, in the LPE attack by exploiting the Sednit team that we analyzed 2017 menu items and exploitation techniques were used, much like the current exploit, ”explains ESET researcher Anton Cherepanov, who discovered the recent vulnerability.
Vulnerability (CVE-2019-1132) affects the following operating systems: Windows 7 Service Pack 1 for 32-bit systems, Windows 7 Service Pack 1 for x64 versions, Windows Server 2008 Service Pack 2 for 32-bit systems, Windows Server 2008 Service Pack 2 for Itanium-based systems, Windows Server 2008 Service Pack 2 for x64-based systems, Windows Server 2008 R2 Service Pack 1 for Itanium-based systems, and Windows Server 2008 R2 Service Pack 1 for x64-based systems.
Windows XP and Windows Server 2003 are also affected, but these versions are not supported by Microsoft.
"Users who are still using Windows 7 Service Pack 1 should consider upgrading to new operating systems as extended support for Windows 7 Service Pack 1 is due to expire on January 14. This means that Windows 2020 users will not receive critical security updates, ”adds Cherepanov.
More technical details about the "0day" exploit can be found in the article The CVE-2019-1132 vulnerability used in targeted attack at WeLiveSecurity.com.
_________________
Read them Technology News from all over the world, with the validity of iGuRu.gr
Follow us on Google News
Comment Policy:
IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators