Windows Kernel Registry Use-After-Free ≈ Packet Storm

Windows Kernel Registry Use-After-Free ≈ Packet Storm

Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]

Windows Kernel Registry Use-After-Free[6]
Authored by Google Security Research[7], mjurczyk[8]

The Windows kernel registry suffers from a use-after-free vulnerability due to bad handling of failed reallocations under memory pressure.

systems | windows[9]
advisories | CVE-2022-37988[10]
SHA-256 | 8bfa22378d9e50ef4b418d4748365b0da33423d42dc3533797aebf4653bedc6d

Login[14] or Register[15] to add favorites

File Archive:

November 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa

File Tags

File Archives

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec[118]
close
Image

Pensée du jour :

Ce que l'homme a fait ,

l'homme peut le défaire.

 

"No secure path in the world"