Google has revealed another vulnerability, this vulnerability can impact both Windows 7 32/64bit and 8.1 update 32/64bit. Last month, a Google security researcher released the vulnerability and refused to wait for two to three days more. However the patch was schedule to be release two days after 90 days period which was against Google Zero policy.
However the latest vulerabilty an “Impersonation Check Bypass With CryptProtectMemory and CRYPTPROTECTMEMORY_SAME_LOGON flag”; the latest vulnerability confirmed on both Windows 7 and 8.1. “The issue is the implementation in CNG.sys doesn’t check the impersonation level of the token when capturing the logon session id (using SeQueryAuthenticationIdToken) so a normal user can impersonate at Identification level and decrypt or encrypt data for that logon session. This might be an issue if there’s a service which is vulnerable to a named pipe planting attack or is storing encrypted data in a world readable shared memory section”.
This vulnerability can allow hacker to impersonate logon session ID at Identification level and decrypt or encrypt data for that logon session.
According to Google researchers, Microsoft was informed of this vulnerability on October 29, and they already planned to fix it in January patch, but because of some Compatibility issues they postponed the patch until Feb. The Fix is now expected on Feb 10.