<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Ntoskrnl.exe on PixiePoint Security</title><link>https://totewaffler-5195.pages.dev/tags/ntoskrnl.exe/</link><description>Recent content in Ntoskrnl.exe on PixiePoint Security</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Aug 2021 00:00:00 +0000</lastBuildDate><atom:link href="https://totewaffler-5195.pages.dev/tags/ntoskrnl.exe/index.xml" rel="self" type="application/rss+xml"/><item><title>Event Tracing for Windows (ETW) `TimerCallbackContext` Object Use-After-Free Vulnerability</title><link>https://totewaffler-5195.pages.dev/blog/0day-cve-2021-34486/</link><pubDate>Mon, 30 Aug 2021 00:00:00 +0000</pubDate><guid>https://totewaffler-5195.pages.dev/blog/0day-cve-2021-34486/</guid><description>&lt;p>The Event Tracing for Windows (ETW) mechanism allows the logging of kernel or application-defined events for debugging purposes. Developers are able to start and stop event tracing sessions, instrument an application to provide trace events, and consume trace events by calling the ETW set of user-mode Windows APIs. Eventually these will lead to corresponding syscall requests to the kernel (ntoskrnl.exe) to perform the functionalities.&lt;/p>
&lt;p>In the ETW request to update periodic capture state, under specific conditions, there exist an use-after-free vulnerability whereby an atacker is able to controllably allocate a 0x30-bytes buffer, free it and reuse this buffer subsequently to execute arbitrary code.&lt;/p></description></item></channel></rss>