S-079: Vulnerability in Windows Kernel


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-079: Vulnerability in Windows Kernel
# 1  
Old 12-24-2007
S-079: Vulnerability in Windows Kernel

An elevation of privilege vulnerability exists in the way that the Windows Kernel processes certain access requests. The risk is MEDIUM. An elevation of privilege.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
privileged(9r)															    privileged(9r)

NAME
privileged - General: Checks for proper privileges SYNOPSIS
int privileged( int privilege, int error_code ); ARGUMENTS
Specifies the privilege to check against. This privilege must be one of the constants defined in /usr/sys/include/sys/security.h. For exam- ple, you would specify SEC_FILESYS for disk drivers that must manipulate partition tables on disk drives. Specifies the value used to con- trol auditing. You can pass one of the system's error codes or one of the following values: -1, 0, 1. An example of an error code is the constant EPERM. DESCRIPTION
The privileged routine checks for an appropriate privilege when the security feature is enabled. Use privileged with a privilege number and with the error_code argument set to the constant EPERM to emulate the traditional behavior of the suser routine. Set error_code to a value of 0 (zero) if you want to check the privilege but not fail the operation if the user does not have the proper privilege. A value of -1 turns off all auditing as well. RETURN VALUES
The privileged routine returns the value 0 (zero) if the process does not have privilege. It returns the value 1 if the process does have privilege. FILES
SEE ALSO
Routines: suser(9r) privileged(9r)