7.8
CVSSv3

CVE-2020-17087

Published: 11/11/2020 Updated: 15/02/2024
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Windows Kernel Local Elevation of Privilege Vulnerability

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2012 r2

microsoft windows 10 1607

microsoft windows 8.1 -

microsoft windows server 2016 -

microsoft windows 7 -

microsoft windows server 2008 -

microsoft windows rt 8.1 -

microsoft windows server 2012 -

microsoft windows 10 -

microsoft windows 10 1803

microsoft windows server 2019 -

microsoft windows 10 1809

microsoft windows server 2016 1903

microsoft windows 10 1903

microsoft windows server 2008 r2

microsoft windows server 2016 1909

microsoft windows 10 1909

microsoft windows 10 2004

microsoft windows server 2016 2004

microsoft windows 10 20h2

microsoft windows server 2016 20h2

Github Repositories

Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow

Table of Contents Table of Contents Introduction Named-Pipes Introduction Exploitation Spraying the non-paged pool Memory Disclosure/Arbitrary Read Complete control over the overflow data Limited control over the overflow data Arbitrary Write Arbitrary Freeing of SECURITY_CLIENT_CONTEXT Objects Approaching Different Pool Overflow Categories Identifying Corrupted Pipes Leak

Snapshot-based coverage-guided windows kernel fuzzer

README Rewind is a snapshot-based coverage-guided fuzzer targeting Windows kernel components The idea is to start from a snapshot of a live running system This snapshot is composed of the physical memory pages along with the state of the cpu This state is used to setup the initial state of a virtual cpu By leveraging on-demand paging only the pages needed for the execution

This is a Simple Script can enable to compare de CVE in csv files with Workload Security Database.

Workload-Security-CVE-Tool This is a Simple Script can enable to compare de CVE in csv files with Workload Security Database Run command pip install -r requirementstxt Create API Key in Workload Security (With AUditor permission is enough) Configure the ApiKey in configyaml Configure the file for extract de CVE (xlsx) Run the script with python SearchCVEpy The script wil

Recent Articles

Microsoft emits 112 security hole fixes – including the cure for a Google-disclosed kernel vuln exploited in the wild
The Register • Thomas Claburn in San Francisco • 11 Nov 2020

Android, Adobe, SAP, Red Hat join the bug-busting party Rust in peace: Memory bugs in C and C++ code cause security issues so Microsoft is considering alternatives once again

Patch Tuesday Microsoft published fixes for 112 software vulnerabilities for its November Patch Tuesday, 17 of which have been rated critical. Of the remainder, 93 are rated important, and two are rated low severity. Fifteen Microsoft products are affected, including: Microsoft Windows, Office, Internet Explorer, Edge (EdgeHTML and Chromium), ChakraCore, Exchange Server, Dynamics, Windows Codecs Library, Azure Sphere, Windows Defender, Teams, Azure SDK, Azure DevOps, and Visual Studio. One of th...

CERT/CC: 'Sensational' bug names spark fear, hype – so we'll give flaws our own labels... like Suggestive Bunny
The Register • Thomas Claburn in San Francisco • 03 Nov 2020

Officials go with randomly selected words with unintentionally hilarious results. Filthy Python, anyone? US-CERT lists the 10 most-exploited security bugs and, yeah, it's mostly Microsoft holes people forgot to patch

Many memorable events get named, whether they're hurricanes, political events, or security incidents like the Morris Worm, which surfaced 32 years ago yesterday. But named security incidents recently have editorialized their own importance with fear-mongering monikers like Heartbleed (2014), Meltdown, Spectre, and Foreshadow (2018), and Fallout and ZombieLoad (2019). Not all do so. There have been less emotionally loaded bug names proposed, like CacheOut, CrossTalk, and RIDL, but name-amplified ...

Windows kernel vulnerability disclosed by Google's Project Zero after bug exploited in the wild by hackers
The Register • Thomas Claburn in San Francisco • 30 Oct 2020

Chocolate Factory spills beans early on privilege-escalation flaw First, Patch Tuesday. Now, Oh Hell, Monday: Microsoft emits bonus fixes for Visual Studio, Windows 10 security bugs

Google's Project Zero bug-hunting team has disclosed a Windows kernel flaw that's being actively exploited by miscreants to gain control of computers. The web giant's bug report was privately disclosed to Microsoft on October 22, and publicly revealed just seven days later, after it detected persons unknown exploiting the programming blunder. The privilege-escalation issue was identified by Mateusz Jurczyk and Sergei Glazunov of Google Project Zero. "The Windows Kernel Cryptography Driver (cng.s...