Microsoft Windows 8 on x86 16-bit Subsystem win32k.sys GreSetPaletteEntries denial of service
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.2 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Microsoft Windows 8 on x86 and classified as problematic. This issue affects the function GreSetPaletteEntries of the file win32k.sys of the component 16-bit Subsystem. Executing a manipulation can lead to denial of service.
Moreover, an exploit is present.
It is suggested to upgrade the affected component.
Details
A vulnerability classified as problematic was found in Microsoft Windows 8 on x86 (Operating System). This vulnerability affects the function GreSetPaletteEntries of the file win32k.sys of the component 16-bit Subsystem. The manipulation with an unknown input leads to a denial of service vulnerability. The CWE definition for the vulnerability is CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. As an impact it is known to affect availability.
The weakness was disclosed 05/21/2014 by Tavis Ormandy as NULL page mitigations on Windows 8 x86 as not defined mailinglist post (Full-Disclosure). The advisory is available at seclists.org. The exploitation appears to be difficult. Local access is required to approach this attack. A single authentication is needed for exploitation. Technical details and also a public exploit are known. The advisory points out:
Interestingly, on Windows 8 x86, there is an intentional exception, if an Administrator has installed the 16bit subsystem the mitigation is worthless because you can run your exploit in the context of NTVDM (simply use the technique I documented in CVE-2010-0232 http://www.exploit-db.com/exploits/11199/).
A public exploit has been developed by Tavis Ormandy in Shell and been published immediately after the advisory. It is possible to download the exploit at seclists.org. It is declared as proof-of-concept. As 0-day the estimated underground price was around $25k-$100k. The advisory illustrates:
This bug can be triggered with typical resource exhaustion patterns (see my exploit for CVE-2013-3660 for reference http://www.exploit-db.com/exploits/25912/). However, I have also stumbled onto a Windows 8 specific technique that does not require resource exhaustion, using the (undocumented) Xferable object flag. See the attached code (the testcase is Windows 8+ on x86 specific, although the bug affects other versions and platforms).
Upgrading eliminates this vulnerability.
The vulnerability is also documented in the databases at Secunia (SA58891†) and SecurityTracker (ID 1030312†). If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Type
Vendor
Name
Version
License
Support
- end of life (old version)
Website
- Vendor: https://www.microsoft.com/
- Product: https://www.microsoft.com/en-us/windows
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.7VulDB Meta Temp Score: 4.2
VulDB Base Score: 4.7
VulDB Temp Score: 4.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Author: Tavis Ormandy
Programming Language: 🔍
Download: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Exploit Delay Time: 🔍
Timeline
05/21/2014 🔍05/21/2014 🔍
05/30/2014 🔍
05/30/2014 🔍
06/01/2014 🔍
09/17/2018 🔍
Sources
Vendor: microsoft.comProduct: microsoft.com
Advisory: NULL page mitigations on Windows 8 x86
Researcher: Tavis Ormandy
Status: Not defined
GCVE (VulDB): GCVE-100-13402
Secunia: 58891 - Microsoft Windows Two Denial of Service Vulnerabilities, Not Critical
SecurityTracker: 1030312
scip Labs: https://www.scip.ch/en/?labs.20140213
Entry
Created: 06/01/2014 17:44Updated: 09/17/2018 07:07
Changes: 06/01/2014 17:44 (51), 09/17/2018 07:07 (8)
Complete: 🔍
Cache ID: 216:080:103
If you want to get best quality of vulnerability data, you may have to visit VulDB.
No comments yet. Languages: en.
Please log in to comment.