TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Bypassing Windows 10's Protections Using a Single Bit

358 点作者 2510c39011c5超过 10 年前

10 条评论

Animats超过 10 年前
When your OS kernel handles scroll bars, you&#x27;re doing something wrong.<p>NT 3.5 had the GUI entirely outside the kernel. For compatibility with Windows 95, much of the Windows 95 GUI code was moved into the kernel. 20 years later, that decision is still causing bugs.
评论 #9031661 未加载
评论 #9033336 未加载
评论 #9031593 未加载
评论 #9031591 未加载
评论 #9033533 未加载
评论 #9031954 未加载
评论 #9032724 未加载
评论 #9033359 未加载
评论 #9035693 未加载
评论 #9031746 未加载
sandworm超过 10 年前
It&#x27;s a flaw. A bad one. But things like this get patched every day. Only an idiot would believe there aren&#x27;t plenty of other undiscovered security flaws in windows, or any other OS. What matters is whether this flaw was ever exploited, whether it was ever spotted in the wild, before it was patched.<p>I am more than happy to criticize microsoft. I truly hate windows and everything it represents. But the system seems to have worked here. The bug was reported and patched before it became a widespread issue. I&#x27;ll save my venom for those all-to-common days where Microsoft fails to address a problem in a timely manner. (or also Apple, plenty of venom for them too.)
评论 #9032011 未加载
评论 #9032067 未加载
评论 #9032231 未加载
mdriley超过 10 年前
This doesn&#x27;t &quot;bypass all Windows security measures&quot;. As of Windows 8, processes can disable win32k syscalls using SetProcessMitigationPolicy with ProcessSystemCallDisablePolicy.<p><a href="https://msdn.microsoft.com/en-us/library/windows/desktop/hh769088%28v=vs.85%29.aspx" rel="nofollow">https:&#x2F;&#x2F;msdn.microsoft.com&#x2F;en-us&#x2F;library&#x2F;windows&#x2F;desktop&#x2F;hh7...</a>
评论 #9031997 未加载
laurent123456超过 10 年前
How do they find exploits like this? Do they check every single kernel functions for unchecked pointers? Do they have some automated way to discover this?
评论 #9032514 未加载
peterkelly超过 10 年前
&gt; This particular vulnerability appears in the <i>GUI component of Microsoft Windows Kernel</i><p>There&#x27;s your problem right there.
评论 #9032131 未加载
MichaelGG超过 10 年前
How many of those new protections listed (DEP, ASLR, page 0 mapping) are still useful with a system like Rust? Cause it seems like a hell of a lot of effort is going into hardening the environment cause the code is just that leaky, but I&#x27;m probably misunderstanding something.
评论 #9032212 未加载
评论 #9032357 未加载
评论 #9032398 未加载
72deluxe超过 10 年前
The dead code comment at the end was informative. Does anyone else use code analysis of C&#x2F;C++ to find dead stores etc.?<p>I have used flawfinder, cppcheck and Xcode (clang&#x27;s) analysis which has helped me find issues.
TheCraiggers超过 10 年前
&gt; <i>After some hard word, however, we managed to produce a fully working exploit which we’ll describe.</i><p>Wait, now I&#x27;m confused... was it a single bit, or an entire word that triggers this bug? ;)
zaroth超过 10 年前
I&#x27;m sorry, wait... they hacked it through the scroll-bars? You can&#x27;t make this shit up.
thclark超过 10 年前
Remove those unnecessary lines of code and you will be surprised how the security holes close by themselves.