Search the Community
Showing results for tags 'com'.
Found 3 results
1337day-Exploits posted a topic in Updated ExploitsThe hardened VirtualBox process on a Windows host does not secure its COM interface leading to arbitrary code injection and elevation of privilege. View the full article
1337day-Exploits posted a topic in Updated ExploitsThe VMX process (vmware-vmx.exe) process configures and hosts an instance of VM. As is common with desktop virtualization platforms the VM host usually has privileged access into the OS such as mapping physical memory which represents a security risk. To mitigate this the VMX process is created with an elevated integrity level by the authentication daemon (vmware-authd.exe) which runs at SYSTEM. This prevents a non-administrator user opening the process and abusing its elevated access. Unfortunately the process is created as the desktop user which results in the elevated process sharing resources such as COM registrations with the normal user who can modify the registry to force an arbitrary DLL to be loaded into the VMX process. Affects VMware Workstation Windows version 14.1.5 (on Windows 10). Also tested on VMware Player version 15. View the full article
1337day-Exploits posted a topic in Updated ExploitsMicrosoft Windows suffers from a COM Desktop Broker privilege escalation vulnerability. View the full article