Google researcher reveals another Windows 0-day
Posted on 23 May 2013.
Tavis Ormandy - the Google researcher known for discovering a slew of Windows, Java and Flash Player vulnerabilities and zero-days and his combative attitude regarding the "responsible disclosure" policy preferred by software companies - has been working on exploiting another Windows zero-day vulnerability and asking for assistance on the Full Disclosure mailing list.


He's been working on it for months, and according to a later post, he has now a working exploit that "grants SYSTEM on all currently supported versions of Windows."

According to Computerworld's Gregg Keizer, Microsoft has confirmed that they have been mare aware of the issue, and are currently investigating it. Luckily, it is not being exploited in the wild as of yet.

According to Secunia, it is a potential privilege escalation vulnerability that could also be used to execute arbitrary code on the target system or DoS it, and affects fully patched Windows 7 and reportedly also Windows 8, but can be taken advantage of only by attackers that have physical access to the machine.









Spotlight

The Software Assurance Marketplace: A response to a challenging problem

Posted on 20 October 2014.  |  The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has recognized how critical the state of software security is to the DHS mission.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Oct 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //