what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

blackICEpc.txt

blackICEpc.txt
Posted Sep 7, 2006
Authored by David Matousek | Site matousec.com

BlackICE PC Protection suffers from a denial of service condition when failing to validate the third argument of NtOpenSection.

tags | advisory, denial of service
SHA-256 | ad322b0aa27a0e340d007804e6b45dbbe64dff3993b8fba713250eda73ce27a1

blackICEpc.txt

Change Mirror Download
Hello,

I would like to inform you about a vulnerability in BlackICE PC Protection
driver found by Matousec - Transparent security.


Description:

Hooking SSDT functions requires extra caution. SSDT function handlers are executed in the kernel mode but their callers
are executed in the user mode. Hence all function arguments come from the user mode. This is why it is necessary to
validate these arguments properly. Otherwise a simple user call can easily crash the whole system. This bug usually
results in a system crash. However, it may happen that this bug is even more dangerous and can lead to the execution of
an arbitrary code in the privileged kernel mode.

BlackICE fails to validate the third argument of NtOpenSection. A call with invalid values in this argument can cause a
system crash because of an error in RapDrv.sys.


Vulnerable software:

* BlackICE PC Protection 3.6.cpn
* BlackICE PC Protection 3.6.cpj
* BlackICE PC Protection 3.6.cpiE
* probably all versions of BlackICE PC Protection 3.6
* possibly older versions


More details and a proof of concept including source code is available here:
http://www.matousec.com/info/advisories/BlackICE-Insufficient-validation-of-arguments-of-NtOpenSection.php

Regards,

--
David Matousek

Founder and Chief Representative of Matousec - Transparent security
http://www.matousec.com/

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close