Exploring a New Class of Kernel Exploit Primitive

By Rohit Mothe , Andrew Ruddick on 08 Dec 2022 @ Blackhat
πŸ“Š Presentation πŸ”— Link
kernel
Focus Areas: Reverse Engineering

Abstract

Microsoft Security Response Center receives and examines many interesting bug classes. Often, the exploitability of those bugs is apparent, but this is not always the case. One interesting outlier is an arbitrary kernel pointer read primitive where the attacker cannot retrieve the content of the memory read. Traditionally, these would have an impact of Denial of Service (DoS) or in some cases a second-order Kernel Memory Information Disclosure (where side channels or indirect probing are possible) but could such a limited primitive actually be exploited for code execution / privilege escalation?