Windows Kerberos Redirected Logon Buffer Privilege Escalation ≈ Packet Storm

Windows Kerberos Redirected Logon Buffer Privilege Escalation ≈ Packet Storm

Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]

Windows Kerberos Redirected Logon Buffer Privilege Escalation[6]
Authored by James Forshaw[7], Google Security Research[8]

On Windows, the buffer for redirected logon context does not protect against spoofing resulting in arbitrary code execution in the LSA leading to local elevation of privilege.

systems | windows[9]
advisories | CVE-2022-24545[10], CVE-2022-30165[11]
SHA-256 | e5fb08a6edcf0b1b0510543eebe8a2074c96f610873eefbc81fd441dc6b36c39

Login[15] or Register[16] to add favorites

File Archive:

July 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa

File Tags

File Archives

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec[119]
close
Image

Pensée du jour :

Ce que l'homme a fait ,

l'homme peut le défaire.

 

"No secure path in the world"