[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Submit #92975: TechPowerUp RealTemp, WinRing0x64.sys, Arbitrary Kernel Executioninfo

TitleTechPowerUp RealTemp, WinRing0x64.sys, Arbitrary Kernel Execution
DescriptionTechPowerUp RealTemp, WinRing0x64.sys, Arbitrary Kernel Execution Version: RealTemp x.x.x.x, WinRing0x64.sys x.x.x.x https://www.techpowerup.com/download/techpowerup-real-temp/ Impact: Arbitrary Kernel Execution Description: RealTemp x.x.x.x contains a known vulnerable component WinRing0x64.sys. A normal user can arbitrarily wrmsr and read/write physical memory, which leads to arbitrary kernel execution.
Source⚠️ https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned4/bin
User
 Zeze7w (UID 40823)
Submission22/02/2023 03:57 (il y a 2 ans)
Moderation26/02/2023 13:25 (4 days later)
StatusAccepté
VulDB Entry221806 [TechPowerUp RealTemp 3.7.0.0 WinRing0x64.sys Local Privilege Escalation]
Points19

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!