The Kernel Object Manager is prone to a deadlock situation which could be exploitable making unkillable any process running, complicating its elimination. Exploit included.
17871ea1d002a3e25ba2cf1431e565ed676c7752e14f1d0fb9ed45a6c632038d
Whitepaper discussing the fact that the Microsoft Server Message Block Redirector Driver (mrxsmb.sys) does not verify the user-mode buffer properly, allowing any user to overwrite any desired memory address. The successful exploitation results in Ring0 code execution.
8e72140b6ea3bdc38e8d99a76cc14e568dce6926a301540aba00a78f7cb44a46