Pedestal Software Integrity Protection Driver (IPD) 1.3 and earlier allows privileged attackers, such as rootkits, to bypass file access restrictions to the Windows kernel by using the NtCreateSymbolicLinkObject function to create a symbolic link to (1) \Device\PhysicalMemory or (2) to a drive letter using the subst command.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2003-01/0017.html | Broken Link Patch |
http://archives.neohapsis.com/archives/bugtraq/2003-01/0018.html | Broken Link Exploit Patch |
http://secunia.com/advisories/7816 | Broken Link Patch Vendor Advisory |
http://www.phrack.org/show.php?p=59&a=16 | Broken Link |
http://www.securityfocus.com/bid/6511 | Broken Link Patch Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/10979 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2003-12-31 05:00
Updated : 2024-02-16 19:01
NVD link : CVE-2003-1233
Mitre link : CVE-2003-1233
CVE.ORG link : CVE-2003-1233
JSON object : View
Products Affected
pedestalsoftware
- integrity_protection_driver
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')