Processes within the sandbox are permitted to use NtQuerySystemInformation to read kernel addresses. #5126
Answered
by
diversenok
nek0y4nsu
asked this question in
Q&A Feedback
-
|
Some attackers exploit privilege escalation vulnerabilities by using NtQuerySystemInformation to leak kernel addresses. Is there a way to prevent programs within Sandboxie from using NtQuerySystemInformation? |
Beta Was this translation helpful? Give feedback.
Answered by
diversenok
Dec 8, 2025
Replies: 1 comment 3 replies
-
|
You may want to open a full bug report about this, if not perhaps a security report |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Newer OS versions already have a built-in mitigation that erases kernel addresses from these info class' output buffers. It might be nice to back-port it to older versions, but that's not a vulnerability by any means.