Pedestal Software Integrity Protection Driver (IPD) 1.3...
Low severity
Unreviewed
Published
Apr 29, 2022
to the GitHub Advisory Database
•
Updated Feb 25, 2024
Description
Published by the National Vulnerability Database
Dec 31, 2003
Published to the GitHub Advisory Database
Apr 29, 2022
Last updated
Feb 25, 2024
Pedestal Software Integrity Protection Driver (IPD) 1.3 and earlier allows privileged attackers, such as rootkits, to bypass file access restrictions to the Windows kernel by using the NtCreateSymbolicLinkObject function to create a symbolic link to (1) \Device\PhysicalMemory or (2) to a drive letter using the subst command.
References