Pedestal Software Integrity Protection Driver (IPD) 1.3 and earlier allows privileged attackers, such as rootkits, to bypass file access restrictions to the Windows kernel by using the NtCreateSymbolicLinkObject function to create a symbolic link to (1) \Device\PhysicalMemory or (2) to a drive letter using the subst command.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2003-01/0017.html | patch broken link mailing list |
http://archives.neohapsis.com/archives/bugtraq/2003-01/0018.html | patch broken link mailing list exploit |
http://www.securityfocus.com/bid/6511 | patch vdb entry broken link third party advisory |
http://www.phrack.org/show.php?p=59&a=16 | broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/10979 | third party advisory vdb entry |
http://secunia.com/advisories/7816 | patch vendor advisory broken link third party advisory |