Google reveals major vulnerability in Windows 10
3 min. read
Published on
Read our disclosure page to find out how can you help Windows Report sustain the editorial team. Read more
Google’s Threat Analysis Group has recently uncovered a set of harmful vulnerabilities in Adobe Flash and the Microsoft Windows kernel that were being actively used for malware attacks against the Chrome browser. Google has publicly announced the security flaw in Windows just 10 days after disclosing it to Microsoft on October 21. Google also pointed out that this flaw could be aggressively used by attackers and coders to compromise security in Windows systems by gaining administrator-level access to the computers using a malware.
This can be achieved by allowing less than honest developers to escape from Windows’ security sandbox that executes only user-level apps without needing admin access. Diving a little deeper into the technicalities, the win32k.sys, a legacy support Windows system library used mainly for graphics, is issued a specific call that grants full access to the Windows environment. Google Chrome already has a defense mechanism in place for this kind of flaw and blocks this attack on Windows 10 using a modification to the Chromium sandbox called “Win32k lockdown“.
Google described this particular Windows vulnerability as follows:
“The Windows vulnerability is a local privilege escalation in the Windows kernel that can be used as a security sandbox escape. It can be triggered via the win32k.sys system call NtSetWindowLongPtr() for the index GWLP_ID on a window handle with GWL_STYLE set to WS_CHILD. Chrome’s sandbox blocks win32k.sys system calls using the Win32k lockdown mitigation on Windows 10, which prevents exploitation of this sandbox escape vulnerability.”
Though this is not Google’s first encounter with a Windows security flaw, they released a public statement regarding a vulnerability and was later bashed my Microsoft for releasing a public note before the official seven-day limit that is granted to software manufacturers to issue a fix.
“After 7 days, per our published policy for actively exploited critical vulnerabilities, we are today disclosing the existence of a remaining critical vulnerability in Windows for which no advisory or fix has yet been released,” wrote Neel Mehta and Billy Leonard of Google’s Threat Analysis Group.”This vulnerability is particularly serious because we know it is being actively exploited.”
A zero-day vulnerability is a publicly disclosed security flaw new to users. And now that the seven-day time period has passed, there is still no patch fix available regarding this bug from Microsoft.
The Flash vulnerability (also disclosed on October 21) that Google shared with Adobe was patched on October 26. So users can simply update to the latest version of Flash. But then again, Microsoft has actively pointed out that for a simple web plugin like Flash, issuing a patch within seven days isn’t a challenging target, but for a complex OS like Windows, it is nearly impossible to code, test, and issue a patch for a security flaw within a week.
Not just Microsoft but many other major software entities have actively opposed this controversial policy of Google of revealing flaws within a week’s limit, but Google has maintained that it is safer for public security to create awareness about a persisting bug that may compromise user safety.
User forum
0 messages