DoS PoC for CVE-2021-40449 (Win32k - LPE)
CVE-2021-40449 is a use-after-free in Win32k that allows for local privilege escalation.
The vulnerability was found in the wild by Kaspersky.
The discovered exploit was written to support the following Windows products:
- Microsoft Windows Vista
- Microsoft Windows 7
- Microsoft Windows 8
- Microsoft Windows 8.1
- Microsoft Windows Server 2008
- Microsoft Windows Server 2008 R2
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
- Microsoft Windows 10 (build 14393)
- Microsoft Windows Server 2016 (build 14393)
- Microsoft Windows 10 (build 17763)
- Microsoft Windows Server 2019 (build 17763)
However, this proof-of-concept is merely a DoS trigger meant to be used for security researchers and alike.
The PoC contains comments and a template ready to be used for fully exploiting the vulnerability.
I highly recommend reading Kaspersky's technical writeup before proceeding.
As mentioned in the technical writeup by Kasperky, the vulnerability exists in GreResetDCInternal
. If an attacker hooks the user-mode callback DrvEnablePDEV
, which is called during hdcOpenDCW
, it is possible to destroy the original device context by calling ResetDC
, which causes a use-after-free in the kernel when the user-mode callback returns.
The following pseudo-code is made partially from the leaked Windows XP source code and by reverse-engineering the latest (before the patch) GreResetDCInternal
from Win32kfull.sys
. The irrelevant parts have been removed with [...]
. Look for the VULN:
comments.
BOOL GreResetDCInternal(
HDC hdc,
DEVMODEW *pdmw,
BOOL *pbBanding,
DRIVER_INFO_2W *pDriverInfo2,
PVOID ppUMdhpdev)
{
// [...]
HDC hdcNew;
{
// Create DCOBJ from HDC
DCOBJ dco(hdc);
if (!dco.bValid())
{
SAVE_ERROR_CODE(ERROR_INVALID_HANDLE);
}
else
{
// Create DEVOBJ from `dco`
PDEVOBJ po(dco.hdev());
// [...]
// Create the new DC
// VULN: Can result in a usermode callback that destroys old DC, which
// invalidates `dco` and `po`
hdcNew = hdcOpenDCW(L"",
pdmw,
DCTYPE_DIRECT,
po.hSpooler,
prton,
pDriverInfo2,
ppUMdhpdev);
if (hdcNew)
{
po->hSpooler = NULL;
DCOBJ dcoNew(hdcNew);
if (!dcoNew.bValid())
{
SAVE_ERROR_CODE(ERROR_INVALID_HANDLE);
}
else
{
// Transfer any remote fonts
dcoNew->pPFFList = dco->pPFFList;
dco->pPFFList = NULL;
// Transfer any color transform
dcoNew->pCXFList = dco->pCXFList;
dco->pCXFList = NULL;
PDEVOBJ poNew((HDEV)dcoNew.pdc->ppdev());
// Let the driver know
// VULN: Method is taken from old (possibly destroyed) `po`
PFN_DrvResetPDEV rfn = po->ppfn[INDEX_DrvResetPDEV];
if (rfn != NULL)
{
(*rfn)(po->dhpdev, poNew->dhpdev);
}
// [...]
}
}
}
}
// Destroy old DC
// [...]
}
As can be seen from the pseudo-code, the old device context can be freed in a user-mode callback from the hdcOpenDCW
call, and later on, the method DrvResetPDEV
is retrieved from the old device context and called with (po->dhpdev, poNew->dhpdev)
. These two arguments can be controlled by the user, since they are returned from the user-mode callback DrvEnablePDEV
for each device context, respectively. It is thus possible to call a kernel function with two user-controlled arguments.
Kaspersky mentions that the original exploit used GDI palette objects and a single kernel function call to achieve arbitrary memory read/write. From here, one could steal a privileged access token to gain SYSTEM privileges.
To create and hook a device context, one can do the following:
- Find an available printer with
EnumPrinters
- Load the printer driver into memory with
OpenPrinter
,GetPrinterDriver
andLoadLibraryExA
- Get the printer driver's user-mode callback table with
GetProcAddress
andDrvEnableDriver
- Unprotect the printer driver's user-mode callback table with
VirtualProtect
- Overwrite the printer driver's desired user-mode callback table entries
- Create a device context for the printer with
CreateDC(NULL, printerName, NULL, NULL)
We should now have a device context for a printer with hooked user-mode callbacks.
We're interested in only one hook, namely DrvEnablePDEV
. This hook is interesting in two aspects: triggering the UAF and controlling the arguments, as described earlier. To trigger the UAF vulnerability, we will call ResetDC
inside of the hook, which will destroy the old device context. When we return from the hook, we will still be inside the first GreResetDCInternal
, which will shortly after get and call the function pointer for DrvResetPDEV
from our old and destroyed device context with the two arguments that got returned from DrvEnablePDEV
; the old and the new DHPDEV
.
If your process is running with a medium integrity level, KASLR should not be an issue with the help of EnumDeviceDrivers
and NtQuerySystemInformation
.