Jump to content

Actively Exploit Zero-day exploit in Windows!!

CVE-2020-117087 is a zero-day discovered by Google's Project Zero, which can use buffer flow for privilege escalation. Google Project Zero discloses vulnerabilities publicly after 90 days. However, this is known to be actively exploited, so it is on a 7-day disclosure. 

 

Microsoft gave a generic sounding response when it went public:

Quote

Microsoft has a customer commitment to investigate reported security issues and update impacted devices to protect customers. While we work to meet all researchers’ deadlines for disclosures, including short-term deadlines like in this scenario, developing a security update is a balance between timeliness and quality, and our ultimate goal is to help ensure maximum customer protection with minimal customer disruption.

The vulnerability was expected to be patched on November 10th. It has also been confirmed that this is not suspected of being election-related.

 

The bug has apparently existed since Windows 7, and still exists in Windows 10 1903 (64-bit), so be sure to update!

 

Details further details on the exploit's workings:

Quote

The Windows Kernel Cryptography Driver (cng.sys) exposes a \Device\CNG device to user-mode programs and supports a variety of IOCTLs with non-trivial input structures. It constitutes a locally accessible attack surface that can be exploited for privilege escalation (such as sandbox escape).

IOCTL is an abbreviation of input/output control. 

 

The actively used part of the exploit relied on a previous Chrome flaw, CVE-2020-117087, an issue in FreeType, which was fixed It was also featured on Techlinked. 

 

My thoughts

 It is important to keep devices on a secure, up to date version for this reason. Especially since there is evidence of it being actively exploited. If you have not updated after the FreeType flaw, you should ASAP.

 

Sources

https://arstechnica.com/information-technology/2020/10/googles-project-zero-discloses-windows-0day-thats-been-under-active-exploit/

https://bugs.chromium.org/p/project-zero/issues/detail?id=2104

 

Link to comment
Share on other sites

Link to post
Share on other sites

So Google only gave them 7 days to fix this then just up and told the world? Idk man, seems kinda phishy to me.

 

But for real, I do think Google should have given them more time (but the argument there is: ThEy hAD tiEM SInCe wiNBloWs SeBUn HURRRRRRR) Yeah, stfu. Seriously, shut the fuck up, please, just shut the fuck up. I am not defending Microsoft here. But it's not like they can find every single bug. It's up to the community and other devs to find and report them. I mean, yes, they've had since Windows 7 to fix it. But how recently was it discovered?

 

Idk man. Maybe I shouldn't have eaten that 7 day old fish in the fridge. Maybe it fucked up my thought process and I'm just totally wrong in my thinking. Oh well, at least it's off my chest now.

 

EDIT:

13 minutes ago, Catt0s said:

actively exploited, so it is on a 7-day disclosure

Weel okay. This makes a bit more sense now that I've read it over again. Feel free to just ignore me ;-;

Link to comment
Share on other sites

Link to post
Share on other sites

Well it's getting patched soon. Google does have weird policy regarding these as we know. I am on the latest version as always though. 

| Ryzen 7 7800X3D | AM5 B650 Aorus Elite AX | G.Skill Trident Z5 Neo RGB DDR5 32GB 6000MHz C30 | Sapphire PULSE Radeon RX 7900 XTX | Samsung 990 PRO 1TB with heatsink | Arctic Liquid Freezer II 360 | Seasonic Focus GX-850 | Lian Li Lanccool III | Mousepad: Skypad 3.0 XL / Zowie GTF-X | Mouse: Zowie S1-C | Keyboard: Ducky One 3 TKL (Cherry MX-Speed-Silver)Beyerdynamic MMX 300 (2nd Gen) | Acer XV272U | OS: Windows 11 |

Link to comment
Share on other sites

Link to post
Share on other sites

It was a dick move by Google to provide MS such short notice before going public.

Link to comment
Share on other sites

Link to post
Share on other sites

50 minutes ago, Doobeedoo said:

Well it's getting patched soon. Google does have weird policy regarding these as we know. I am on the latest version as always though. 

 

26 minutes ago, StDragon said:

It was a dick move by Google to provide MS such short notice before going public.

It is actively being exploited prior to Google releasing the information.  Honestly, I would rather Google announce it rather than keep it quiet and let things get exploited (which MS stays silent).  The key thing being this is actively being exploited

3735928559 - Beware of the dead beef

Link to comment
Share on other sites

Link to post
Share on other sites

44 minutes ago, wanderingfool2 said:

 

It is actively being exploited prior to Google releasing the information.  Honestly, I would rather Google announce it rather than keep it quiet and let things get exploited (which MS stays silent).  The key thing being this is actively being exploited

Well yes and no depends what kind of problem it is. We've heard before that some things were not known, but Google released it without giving MS really any time to act.

Not sure how those two work behind the scenes but it seems it should be more tightly worked on.

| Ryzen 7 7800X3D | AM5 B650 Aorus Elite AX | G.Skill Trident Z5 Neo RGB DDR5 32GB 6000MHz C30 | Sapphire PULSE Radeon RX 7900 XTX | Samsung 990 PRO 1TB with heatsink | Arctic Liquid Freezer II 360 | Seasonic Focus GX-850 | Lian Li Lanccool III | Mousepad: Skypad 3.0 XL / Zowie GTF-X | Mouse: Zowie S1-C | Keyboard: Ducky One 3 TKL (Cherry MX-Speed-Silver)Beyerdynamic MMX 300 (2nd Gen) | Acer XV272U | OS: Windows 11 |

Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, Doobeedoo said:

Well yes and no depends what kind of problem it is. We've heard before that some things were not known, but Google released it without giving MS really any time to act.

Not sure how those two work behind the scenes but it seems it should be more tightly worked on.

Given the overflow type, I would suspect it would have been an easy enough patch (one that MS likely already has, just isn't putting it out until next Tuesday).  The specific exploit was being used in conjunction with a Chrome exploit to run code on a system...guessing that's how the security team originally found it...so I'm all for disclosure of the vulnerability.

3735928559 - Beware of the dead beef

Link to comment
Share on other sites

Link to post
Share on other sites

Why does it matter whether google went public with it or not. Ultimately it still needs to get fixed

Link to comment
Share on other sites

Link to post
Share on other sites

14 minutes ago, WindirBear said:

Why does it matter whether google went public with it or not. Ultimately it still needs to get fixed

Because while the exploit is being weaponized, what Google did was point a spotlight on it thus announcing the availability in greater numbers. So while it was a problem, Google just threw gasoline on the fire.

Link to comment
Share on other sites

Link to post
Share on other sites

Don't run new programs for the next 7 days if you want to be safe

Don't ask to ask, just ask... please 🤨

sudo chmod -R 000 /*

Link to comment
Share on other sites

Link to post
Share on other sites

19 minutes ago, StDragon said:

Because while the exploit is being weaponized, what Google did was point a spotlight on it thus announcing the availability in greater numbers. So while it was a problem, Google just threw gasoline on the fire.

but it also lets users take steps to try and mitigate the problem 

Link to comment
Share on other sites

Link to post
Share on other sites

19 minutes ago, spartaman64 said:

but it also lets users take steps to try and mitigate the problem 

Do or do not, there is no try.

 

You would be very surprised how many corporate networks are in neglect around the world.

Link to comment
Share on other sites

Link to post
Share on other sites

8 hours ago, Sauron said:

Don't run new programs for the next 7 days if you want to be safe

What i dont get is why don't AV pick this up now that it's known? 

 

Don't they always tell you to protect you from exactly those things? 

 

 

The direction tells you... the direction

-Scott Manley, 2021

 

Softwares used:

Corsair Link (Anime Edition) 

MSI Afterburner 

OpenRGB

Lively Wallpaper 

OBS Studio

Shutter Encoder

Avidemux

FSResizer

Audacity 

VLC

WMP

GIMP

HWiNFO64

Paint

3D Paint

GitHub Desktop 

Superposition 

Prime95

Aida64

GPUZ

CPUZ

Generic Logviewer

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, Mark Kaine said:

What i dont get is why don't AV pick this up now that it's known? 

 

Don't they always tell you to protect you from exactly those things? 

 

 

The attack vector is known, but realistically I don't know how much an AV could really do.  (They can't be scanning ever single call a program makes to try watching for an overflow...or else system performance would tumble).  They could do things like try detecting the signatures of programs, but it's like playing cat and mouse...everytime AV advances to catch the newest and greatest exploits, the virus makes come up with new ways to hide it.

3735928559 - Beware of the dead beef

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, wanderingfool2 said:

The attack vector is known, but realistically I don't know how much an AV could really do.  (They can't be scanning ever single call a program makes to try watching for an overflow...or else system performance would tumble).  They could do things like try detecting the signatures of programs, but it's like playing cat and mouse...everytime AV advances to catch the newest and greatest exploits, the virus makes come up with new ways to hide it.

Hmm, yeah I see, I just thought it could be like with "trainers" for example, the AV isn't actively scanning those but it can tell you upon initial scan that it "might" be a malicious program (because it "hooks" into other exes) 

 

 

Maybe that's what you mean with looking up signatures, not sure, but still the point is I don't quite get get it, why AV can do this for 'some' programs but not for others. 

 

All the while advertising being able to recognize "day zero attacks" 

 

 

I do think malwarebytes is pretty good with that, but not flawless either. 

The direction tells you... the direction

-Scott Manley, 2021

 

Softwares used:

Corsair Link (Anime Edition) 

MSI Afterburner 

OpenRGB

Lively Wallpaper 

OBS Studio

Shutter Encoder

Avidemux

FSResizer

Audacity 

VLC

WMP

GIMP

HWiNFO64

Paint

3D Paint

GitHub Desktop 

Superposition 

Prime95

Aida64

GPUZ

CPUZ

Generic Logviewer

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

3 hours ago, Mark Kaine said:

What i dont get is why don't AV pick this up now that it's known? 

AVs can pick up a virus, as in a specific program. They can't necessarily pick up an unknown program trying to exploit a zero day. Antimalware is better at this.

Don't ask to ask, just ask... please 🤨

sudo chmod -R 000 /*

Link to comment
Share on other sites

Link to post
Share on other sites

11 hours ago, StDragon said:

Because while the exploit is being weaponized, what Google did was point a spotlight on it thus announcing the availability in greater numbers. So while it was a problem, Google just threw gasoline on the fire.

You've got that backwards. The criminals already knew about it and were actively exploiting it. What Google did is make the general public aware of it and force MS to fix it sooner rather than later.

Main Rig:-

Ryzen 7 3800X | Asus ROG Strix X570-F Gaming | 16GB Team Group Dark Pro 3600Mhz | Corsair MP600 1TB PCIe Gen 4 | Sapphire 5700 XT Pulse | Corsair H115i Platinum | WD Black 1TB | WD Green 4TB | EVGA SuperNOVA G3 650W | Asus TUF GT501 | Samsung C27HG70 1440p 144hz HDR FreeSync 2 | Ubuntu 20.04.2 LTS |

 

Server:-

Intel NUC running Server 2019 + Synology DSM218+ with 2 x 4TB Toshiba NAS Ready HDDs (RAID0)

Link to comment
Share on other sites

Link to post
Share on other sites

10 minutes ago, Sauron said:

Antimalware is better at this.

Yeah, I mean... that's what I mean... "AV" is just the umbrella term to me... For example Windows defender will not pick up trainers, malwarebytes will though. (it's the only kind of "malware" I ever get lol *forever lonely.jpg*)

 

So yes, I think if there's some kind of pattern it should be possible to pick it up? 

 

But is obviously not reliable or something? Idk maybe people don't scan everything they download, I SCAN EVERYTHING, even jpgs... 🤷🏼

The direction tells you... the direction

-Scott Manley, 2021

 

Softwares used:

Corsair Link (Anime Edition) 

MSI Afterburner 

OpenRGB

Lively Wallpaper 

OBS Studio

Shutter Encoder

Avidemux

FSResizer

Audacity 

VLC

WMP

GIMP

HWiNFO64

Paint

3D Paint

GitHub Desktop 

Superposition 

Prime95

Aida64

GPUZ

CPUZ

Generic Logviewer

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Master Disaster said:

You've got that backwards. The criminals already knew about it and were actively exploiting it. What Google did is make the general public aware of it and force MS to fix it sooner rather than later.

Pretty much 

The direction tells you... the direction

-Scott Manley, 2021

 

Softwares used:

Corsair Link (Anime Edition) 

MSI Afterburner 

OpenRGB

Lively Wallpaper 

OBS Studio

Shutter Encoder

Avidemux

FSResizer

Audacity 

VLC

WMP

GIMP

HWiNFO64

Paint

3D Paint

GitHub Desktop 

Superposition 

Prime95

Aida64

GPUZ

CPUZ

Generic Logviewer

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, Mark Kaine said:

Yeah, I mean... that's what I mean... "AV" is just the umbrella term to me... For example Windows defender will not pick up trainers, malwarebytes will though. (it's the only kind of "malware" I ever get lol *forever lonely.jpg*)

 

So yes, I think if there's some kind of pattern it should be possible to pick it up? 

AM is "better" for this but there's still no guarantee it will pick up everything. If you're worried, again, just wait a few days for the patch to drop. As far as I can tell this doesn't work through a browser (unless you have an old chrome version) so visiting websites should be safe enough.

Don't ask to ask, just ask... please 🤨

sudo chmod -R 000 /*

Link to comment
Share on other sites

Link to post
Share on other sites

12 hours ago, StDragon said:

Because while the exploit is being weaponized, what Google did was point a spotlight on it thus announcing the availability in greater numbers. So while it was a problem, Google just threw gasoline on the fire.

I'll try explain this, it's much less dramatic than you're trying to paint it. 

So Google finds security flaw. 

Tells MS about it and says " you got 7 days to fix this or we'll go public" 

Then MS says: "Fuck off, don't tell me what to do!" 

 

And, 7 days later Google does what it said and goes public. 

And of course MS will fix the security flaw now 'asap'. 

 

There's nothing abnormal or egregious about that, just a big Kindergarten. :)

The direction tells you... the direction

-Scott Manley, 2021

 

Softwares used:

Corsair Link (Anime Edition) 

MSI Afterburner 

OpenRGB

Lively Wallpaper 

OBS Studio

Shutter Encoder

Avidemux

FSResizer

Audacity 

VLC

WMP

GIMP

HWiNFO64

Paint

3D Paint

GitHub Desktop 

Superposition 

Prime95

Aida64

GPUZ

CPUZ

Generic Logviewer

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

45 minutes ago, Sauron said:

As far as I can tell this doesn't work through a browser (unless you have an old chrome version)

Welp, im not on latest version. 

 

Quote

Hi, everyone! We've just released Chrome 86 (86.0.4240.185) 

I'm on 86.0.4240.183

 

Google not much better than Microsoft it seems.

The direction tells you... the direction

-Scott Manley, 2021

 

Softwares used:

Corsair Link (Anime Edition) 

MSI Afterburner 

OpenRGB

Lively Wallpaper 

OBS Studio

Shutter Encoder

Avidemux

FSResizer

Audacity 

VLC

WMP

GIMP

HWiNFO64

Paint

3D Paint

GitHub Desktop 

Superposition 

Prime95

Aida64

GPUZ

CPUZ

Generic Logviewer

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, Mark Kaine said:

I'm on 86.0.4240.183

The relevant flaw was patched on 86.0.4240.111

Don't ask to ask, just ask... please 🤨

sudo chmod -R 000 /*

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, Sauron said:

The relevant flaw was patched on 86.0.4240.111

Oh, Google are pretty quick, huh! 

 

Thanks for the info. :D

The direction tells you... the direction

-Scott Manley, 2021

 

Softwares used:

Corsair Link (Anime Edition) 

MSI Afterburner 

OpenRGB

Lively Wallpaper 

OBS Studio

Shutter Encoder

Avidemux

FSResizer

Audacity 

VLC

WMP

GIMP

HWiNFO64

Paint

3D Paint

GitHub Desktop 

Superposition 

Prime95

Aida64

GPUZ

CPUZ

Generic Logviewer

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×