5 results (0.002 seconds)

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 1

17 Aug 2004 — The ZwOpenSection function in Integrity Protection Driver (IPD) 1.4 and earlier allows local users to cause a denial of service (crash) via an invalid pointer in the "oa" argument. • http://marc.info/?l=bugtraq&m=109276749821133&w=2 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

31 Dec 2003 — Pedestal Software Integrity Protection Driver (IPD) 1.3 and earlier allows privileged attackers, such as rootkits, to bypass file access restrictions to the Windows kernel by using the NtCreateSymbolicLinkObject function to create a symbolic link to (1) \Device\PhysicalMemory or (2) to a drive letter using the subst command. • http://archives.neohapsis.com/archives/bugtraq/2003-01/0017.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

31 Dec 2003 — NtCreateSymbolicLinkObject in ntdll.dll in Integrity Protection Driver (IPD) 1.2 and 1.3 allows local users to create and overwrite arbitrary files via a symlink attack on \winnt\system32\drivers using the subst command. • http://archives.neohapsis.com/archives/bugtraq/2003-01/0017.html •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 1

31 Dec 2002 — restrictEnabled in Integrity Protection Driver (IPD) 1.2 delays driver installation for 20 minutes, which allows local users to insert malicious code by setting system clock to an earlier time. • http://archives.neohapsis.com/archives/bugtraq/2002-12/0021.html •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2002 — Integrity Protection Driver (IPD) 1.2 and earlier blocks access to \Device\PhysicalMemory by its name, which could allow local privileged processes to overwrite kernel memory by accessing the device through a symlink. • http://archives.neohapsis.com/archives/ntbugtraq/2002-q4/0087.html •