An issue in Binalyze IREC.sys v.3.11.0 and before allows a local attacker to execute arbitrary code and escalate privileges via the fun_1400084d0 function in IREC.sys driver.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://blog.dru1d.ninja/windows-driver-exploit-development-irec-sys-a5eb45093945 | third party advisory exploit |
https://gist.github.com/dru1d-foofus/1af21179f253879f101c3a8d4f718bf0 | third party advisory exploit |
https://github.com/magicsword-io/LOLDrivers/blob/main/yaml/d74fdf19-b4b0-4ec2-9c29-4213b064138b.yml | product exploit |