Google researcher reveals another Windows 0-day
Posted on 23 May 2013.
Tavis Ormandy - the Google researcher known for discovering a slew of Windows, Java and Flash Player vulnerabilities and zero-days and his combative attitude regarding the "responsible disclosure" policy preferred by software companies - has been working on exploiting another Windows zero-day vulnerability and asking for assistance on the Full Disclosure mailing list.


He's been working on it for months, and according to a later post, he has now a working exploit that "grants SYSTEM on all currently supported versions of Windows."

According to Computerworld's Gregg Keizer, Microsoft has confirmed that they have been mare aware of the issue, and are currently investigating it. Luckily, it is not being exploited in the wild as of yet.

According to Secunia, it is a potential privilege escalation vulnerability that could also be used to execute arbitrary code on the target system or DoS it, and affects fully patched Windows 7 and reportedly also Windows 8, but can be taken advantage of only by attackers that have physical access to the machine.









Spotlight

Leveraging network intelligence and deep packet inspection

Posted on 26 November 2014.  |  Tomer Saban, CEO of WireX Systems, talks about how deep packet inspection helps with identifying emerging threats, the role of network intelligence, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Nov 27th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //