SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers
Story image
Varonis uncovers two new Windows vulnerabilities
Thu, 27th Oct 2022
FYI, this story is more than a year old

Users don’t have to use Internet Explorer for its legacy to have left you vulnerable to LogCrusher and OverLog, a pair of Windows vulnerabilities discovered by the Varonis Threat Labs team. 

Microsoft ended support for Internet Explorer on June 15, 2022. However, IE’s deep integration into the Windows ecosystem impacts the security and stability of current Windows operating systems.

One IE and Windows integration feature is an Internet Explorer-specific Event Log on all current Windows operating systems. 

This IE-specific Event Log has a distinct set of permissions that enable two exploits against Windows systems:

  1. LogCrusher, which allowed any domain user to remotely crash the Event Log application of any Windows machine on the domain
  2. OverLog, which causes a remote denial-of-service (DoS) attack by filling the hard drive space of any Windows machine on the domain

 Enter Microsoft Event Log Remoting Protocol (MS-EVEN)

These exploits (LogCrusher and OverLog) both use functions of the Microsoft Event Log Remoting Protocol (MS-EVEN), which allows for remote manipulation of a machine’s event logs.

“The Event Log Remoting Protocol is an RPC-based protocol that exposes remote procedure call (RPC) methods for reading events in both live event logs and backup event logs on remote computers,” says Microsoft.

Internet Explorer log handle

OpenEventLogW is a Windows API function that allows a user to open a handle for a specific event log on a local or remote machine.

This function is useful for services that can use it to read, write, and clear event logs for remote machines without the need to connect manually to the machines themselves.

The function takes two parameters:

  1. lpUNCServerName — The remote machine name, or NULL for a local connection
  2. lpSourceName — The specific Event Log to get the handle to

By default, low-privilege, non-administrative users cannot get a handle for event logs of other machines.

The one exception to this is the legacy “Internet Explorer” log — which exists in every Windows version and has its own security descriptor that overrides the default permissions.


ElfClearELFW is an MS-EVEN function that allows administrators to remotely clear and backup event logs.

The function takes two parameters:

  1. LogHandle — Log handle that has an already opened OpenEventLog function
  2. BackupFileName — a pointer to a Unicode string struct that holds the location for backing up the event log before it is cleared

Unfortunately, the ElfClearELFW function has an improper input validation bug. It expects that the BackupFileName structure will be initialised with some values or zeros, but when the pointer to the structure is NULL, the process crashes.

Attack flow

  1. Combining these two functions, the LogCrusher attack flow. Call the OpenEventLog function for the “internet explorer” Event Log on the victim machine: Handle = OpenEventLog(<victim machine>,internet explorer)
  2. Call the ElfClearELFW function with the handle that was returned, and NULL as the BackupFileName parameter: ElfClearELFW(Handle, NULL)

The Event Log service will try to restart itself two more times. On the third time, it will stay down for 24 hours.


The impact lies in the fact that many security controls rely on the normal operation of the Event Log service.

Without logs, security controls are blind; security control products, in some cases, attach themselves to the service. 

This in turn could allow an attacker to use any type of usually detected exploit or attack with impunity as many alerts won’t trigger.


With this attack,  the same methodology and “internet explorer” Event Log handle were used together with another vulnerability in BackupEventLogW function to cause permanent DoS for every
Windows machine.

According to Microsoft, the BackupEventLogW function saves the specified event log to a backup file. 

The function does not clear the event log, the BackupEventLog function fails with the ERROR_PRIVILEGE_NOT_HELD error if the user does not
have the SE_BACKUP_NAME privilege.

Attack flow

  1. Get a handle to the Internet Explorer Event Log on the victim machine (same as before).
  2. Write some arbitrary logs to the Event Log (random strings; different lengths).
  3. Backup the log to a writeable folder on the machine (example: “c:\windows\tasks”) that every domain user has write permission to by default.
  4. Repeat the backup process until the hard drive is full and the computer ceases operation.
  5. Victim machine is unable to write “pagefile” (virtual memory), rendering it unusable.

Microsoft response and recommendations

Microsoft has opted not to fully fix the LogCrusher vulnerability on Windows 10 (more recent operating systems are unaffected).

The default permissions setting that had allowed non-administrative users access to the Internet Explorer Event Log on remote machines has been restricted to local administrators, greatly reducing the potential for harm.

While this address this particular set of Internet Explorer Event Log exploits, there remains potential for other user-accessible application Event Logs to be similarly leveraged for attacks.

“We recommend that all potentially vulnerable systems apply the Microsoft-provided patch and monitor any suspicious activity,” says Microsoft.