New PoC forces Microsoft to wake up: Microsoft appears to be trying to develop a patch that fixes Windows bugs used to infect the operating system system for more than two decades.
Israeli security researcher Gil Dabah said he published a proof-of-concept and a report detailing 25 bugs. The PoC presents an exploit in variants for the same type of vulnerability present in the component Win32k.
The Dabah project presents attacks in the Windows operating system known since the mid-90s. THE vulnerabilities affect Win32k, a Windows component that manages the user interface on 32-bit Windows architectures and the interactions between UI components, drivers, and the Kernel of the Windows operating system.
Today, Win32k is still present in Windows, even in 64-bit versions, and acts as a layer that allows older applications to run on the modern system.
So fixing Win32k is quite a difficult task. Some functions occur entirely in the kernel space, while others use older parts of the code.
For more than a decade, security researchers have been detailing many techniques for inserting malicious code into Win32k, which helps them gain administrator privileges.
Today, however, even after Microsoft's inaction, the Israeli researcher published a 34-page report that describes many methods for attacking through the element Win32k.
The researcher found 25 different bugs, some of which work even in the latest versions of Windows 10.
But Dabah said that Microsoft is currently developing a "bug fix to solve this class of problems once and for all." The fix is currently in the version WIP (Windows Insider Preview), according to Dabah.
Once this mitigation comes alive, Dabah hopes to link all the other bugs to the same vulnerability, even those that have not yet been discovered or documented.
Read the researcher report (PDF) and download PoC for 13 of the 25 errors by GitHub.