Rule Category

OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself. (such as?)

Alert Message

OS-WINDOWS Microsoft Windows win32k use after free attempt

Rule Explanation

This event is generated when an attacker attempts to exploit a use after free in Microsoft Windows. Impact: Attempted User Privilege Gain Details: This rule fires on attempts to exploit a use after free in the Windows Kernel's handling of messages. Ease of Attack:

What To Look For

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic:

Technique:

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

CVE

Additional Links

CVE Additional Information

CVE-2019-1071
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1073.
Details
Severity Base Score5.5
Impact Score3.6 Exploit Score1.8
Confidentiality ImpactHIGH Integrity ImpactNONE
Availability ImpactNONE Attack VectorLOCAL
ScopeUNCHANGED User InteractionNONE
Authentication Ease of AccessLOW
Privileges RequiredLOW