Windows PspBuildCreateProcessContext Double-Fetch / Buffer Overflow ≈ Packet Storm

Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]

Windows PspBuildCreateProcessContext Double-Fetch / Buffer Overflow[6]
Authored by gabe_k[7]

Proof of concept code that demonstrates how the Windows kernel suffers from a privilege escalation vulnerability due to a double-fetch in PspBuildCreateProcessContext that leads to a stack buffer overflow.

systems | windows[8]
advisories | CVE-2024-26218[9]
SHA-256 | 0d419f34140c82908299252d3794e80651aedada14ee132d75462cbcf8700e96

Login[13] or Register[14] to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa

File Tags

File Archives

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services[119]
Hosting By
Rokasec[120]
close
Image

Pensée du jour :

Ce que l'homme a fait ,

l'homme peut le défaire.

 

"No secure path in the world"