header-logo
Suggest Exploit
vendor:
Win32 API
by:
iDEFENSE, Brett Moore
7.2
CVSS
HIGH
Inter-Window Message Passing System
119
CWE
Product Name: Win32 API
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2002

Win32 API Design Error

Attackers with local access may exploit this vulnerability to elevate privileges if a window belonging to another process with higher privileges is present. A paper, entitled 'Win32 Message Vulnerabilities Redux' has been published by iDEFENSE that describes another Windows message that may be abused in a similar manner to WM_TIMER. Another proof-of-concept has been released by Brett Moore in a paper entitled 'Shattering SEH III' which demonstrates how Shatter attacks may be used against applications which make use of progress bar controls. Brett Moore has released a paper entitled 'Shattering By Example' which summarizes previous Shatter attacks, discusses new techniques and also provides an exploit which abuses Windows statusbars using WM_SETTEXT, SB_SETTEXT, SB_GETTEXTLENGTH, SB_SETPARTS and SB_GETPARTS messages.

Mitigation:

Microsoft has released a statement regarding this issue. Please see the References section for details.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/5408/info
       
A serious design error in the Win32 API has been reported. The issue is related to the inter-window message passing system. This vulnerability is wide-ranging and likely affects almost every Win32 window-based application. Attackers with local access may exploit this vulnerability to elevate privileges if a window belonging to another process with higher privileges is present. One example of such a process is antivirus software, which often must run with LocalSystem privileges.
       
** Microsoft has released a statement regarding this issue. Please see the References section for details.
       
A paper, entitled "Win32 Message Vulnerabilities Redux" has been published by iDEFENSE that describes another Windows message that may be abused in a similar manner to WM_TIMER. Microsoft has not released patches to address problems with this message. There are likely other messages which can be exploited in the same manner.
       
Another proof-of-concept has been released by Brett Moore in a paper entitled "Shattering SEH III". This paper demonstrates how Shatter attacks may be used against applications which make use of progress bar controls.
       
Brett Moore has released a paper entitled "Shattering By Example" which summarizes previous Shatter attacks, discusses new techniques and also provides an exploit which abuses Windows statusbars using WM_SETTEXT, SB_SETTEXT, SB_GETTEXTLENGTH, SB_SETPARTS and SB_GETPARTS messages. Please see the attached reference to the paper for more details.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21691.zip