Vulnerability Watch

Forum Discussion

snarang's avatar
snarang
Product Team
6 years ago

Local Privilege Escalation Bugs Including Four Zero-Day...

Local Privilege Escalation Bugs Including Four Zero-Day Vulnerabilities Disclosed by SandboxEscaper

Over the span of three days, from May 21 to May 23, security researcher SandboxEscaper published proof-of-concept (PoC) code for five vulnerabilities in Windows Task Scheduler (bearlpe), Windows Error Reporting (angrypolarbear2), Internet Explorer 11 (IE11), Microsoft Edge, and Windows Installer. Four of these five vulnerabilities are zero-days at the time the vulnerabilities were revealed. These follow previous public disclosures from this researcher of zero-day vulnerabilities in Windows Task Scheduler in August 2018, Data Sharing Service in October 2018 and ReadFile.exe and Windows Error Reporting (WER) in December 2018.

The five vulnerabilities published are named based on the folder names for each PoC:

  1. “bearlpe” (zero-day)
  2. “angrypolarbear2”
  3. “sandboxescape” (zero-day)
  4. “CVE-2019-0841-BYPASS” (zero-day)
  5. “InstallerBypass” (zero-day)

One of the five vulnerabilities, angrypolarbear2, was fixed in the May 2019 Patch Tuesday release and is designated as CVE-2019-0863.

To learn more, please visit our blog.

Please note that since publication, it appears the researcher has removed the proof-of-concept (PoC) code from Github.

No RepliesBe the first to reply