Windows Kernel 64-bit stack memory... CVE-2018-0897 CNNVD-201803-505

1.9 AV AC AU C I A
发布: 2018-03-14
修订: 2020-08-24

We have discovered a new Windows kernel memory disclosure vulnerability in the creation and copying of a EXCEPTION_RECORD structure to user-mode memory while passing execution to a user-mode exception handler. The vulnerability affects 64-bit versions of Windows 7 to 10. The leak was originally detected under the following stack trace (Windows 7): ``` kd> k # Child-SP RetAddr Call Site 00 fffff880`040b7e18 fffff800`026ca362 nt!memcpy+0x3 01 fffff880`040b7e20 fffff800`026db3bc nt!KiDispatchException+0x421 02 fffff880`040b84b0 fffff800`0268fafb nt!KiRaiseException+0x1b4 03 fffff880`040b8ae0 fffff800`0268d093 nt!NtRaiseException+0x7b 04 fffff880`040b8c20 00000000`74b5cb49 nt!KiSystemServiceCopyEnd+0x13 ``` and more specifically in the copying of the EXCEPTION_RECORD structure: ``` kd> dt _EXCEPTION_RECORD @rdx ntdll!_EXCEPTION_RECORD +0x000 ExceptionCode : 0n1722 +0x004 ExceptionFlags : 1 +0x008 ExceptionRecord : (null) +0x010 ExceptionAddress : 0x00000000`765fc54f Void +0x018...

0%
当前有1条漏洞利用/PoC
当前有14条受影响产品信息