S-258: Vulnerability in Windows Kernel


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-258: Vulnerability in Windows Kernel
# 1  
Old 04-09-2008
S-258: Vulnerability in Windows Kernel

An elevation of privilege vulnerability exists due to the Windows kernel improperly validating input passed from user mode to the kernel. The vulnerability could allow an attacker to run code with elevated privileges. The risk is MEDIUM. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
elksemu(1)						      General Commands Manual							elksemu(1)

NAME
elksemu - Embedded Linux Kernel Subset emulator SYNOPSIS
/lib/elksemu program [arguments] DESCRIPTION
Elksemu is a program that allows 8086 ELKS programs to be run under Linux-i386. These programs can be compiled using the bcc(1) C compiler. It is not usual to invoke /lib/elksemu directly, either the simple patch or kernel module distributed with it will cause the kernel to run /lib/elksemu with the correct arguments whenever the user tries to execute an ELKS executable directly. OPTIONS
There are no flag options to elksemu, the first argument is the name of the program to run the rest are arguments that are passed to the Elks program. The elksemu program is normally installed suid-root and in this event it is able to run execute only (chmod 111) elks executables and act correctly on the suid permission bits on those executable. This may be considered a security hazard so elksemu does not have to be installed suid-root. SEE ALSO
bcc(1), as86(1), ld86(1) BUGS
Elksemu is incomplete. The program may still have security bugs! Jan, 1997 elksemu(1)