Windows Kernel 64-bit pool memory... CVE-2018-0813 CNNVD-201803-531

2.1 AV AC AU C I A
发布: 2018-03-14
修订: 2020-08-24

We have discovered that the win32k!UMPDOBJ::LockSurface function discloses portions of uninitialized pool memory to user-mode clients. The bug was encountered on Windows 7 64-bit; other versions were not tested. The leak was detected in the context of the splwow64.exe process, under the following stack trace: ``` kd> k # Child-SP RetAddr Call Site 00 fffff880`03e5cb58 fffff960`002da736 win32k!memcpy+0x3 01 fffff880`03e5cb60 fffff960`0026272e win32k!UMPDOBJ::LockSurface+0xbe 02 fffff880`03e5cbf0 fffff800`0268d093 win32k!NtGdiEngLockSurface+0x42 03 fffff880`03e5cc20 000007fe`ff016d8a nt!KiSystemServiceCopyEnd+0x13 04 00000000`01c2f1f8 000007fe`f32a4d58 GDI32!ZwGdiEngLockSurface+0xa 05 00000000`01c2f200 000007fe`f32a42e3 mxdwdrv!edocs::PDev::CreateThumbnailBitmap+0x25c 06 00000000`01c2f680 000007fe`f32947af mxdwdrv!edocs::PDev::CreateBitmapsForThumbnail+0x2b 07 00000000`01c2f6d0 000007fe`ff020e9b mxdwdrv!DrvEnableSurface+0x13b 08 00000000`01c2f730 00000000`ffc6c329...

0%
当前有1条漏洞利用/PoC
当前有14条受影响产品信息