- Joined
- Mar 3, 2018
- Messages
- 1,713
Big Windows security holes aren't exactly rare. Now, it seems that another Zero Day vulnerability is out in the wild. GitHub user SandboxEscaper uploaded proof-of-concept code for the attack, and announced it in a rather colorful tweet. The exploit, which is related to the Windows Task Scheduler, allows a potential attacker to gain system access privileges. Microsoft says they are aware of the issue, and claims that a patch will be released next Tuesday.
ALPC, Advanced Local Procedure Call, restricts the impact somewhat, since it's a local bug: you have to be already logged in, or running code on, a machine to hijack it. However, it opens an all-too-familiar attack vector: if an attacker can get a target to download and run an app, local privilege escalation gets the malware out of the normal user context up to, in this case, system privileges.
ALPC, Advanced Local Procedure Call, restricts the impact somewhat, since it's a local bug: you have to be already logged in, or running code on, a machine to hijack it. However, it opens an all-too-familiar attack vector: if an attacker can get a target to download and run an app, local privilege escalation gets the malware out of the normal user context up to, in this case, system privileges.