Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft Windows application policy bypass
Published:24.02.2011
Source:
SecurityVulns ID:11455
Type:local
Threat Level:
6/10
Description:It's possible to bypass application restriction policy by directly loading code into suspended process' memory via e.g. Microsoft Word macro.
Affected:MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
 MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
Original documentdocumentFar Sighter, Microsoft Windows application restriction policy bypass (24.02.2011)
Files:XRun - module to replace suspended process' memory

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod