vendor:
Windows
by:
Anonymous
7.8
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Windows
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows
2020
Windows Kernel Crash in memcpy()
We have encountered a Windows kernel crash in memcpy() called by nt!MiRelocateImage while trying to load a malformed PE image into the process address space as a data file (i.e. LoadLibraryEx(LOAD_LIBRARY_AS_DATAFILE | LOAD_LIBRARY_AS_IMAGE_RESOURCE)). An example crash log generated after triggering the bug is shown below.
Mitigation:
Ensure that all user input is validated and sanitized before being used in any system operations.