# N/A
## 漏洞概述
存在一个远程代码执行漏洞,当未认证的攻击者通过RDP连接到目标系统并发送特制的请求时,可以利用此漏洞。该服务以前称为终端服务,现称为远程桌面服务。
## 影响版本
未提供具体版本信息。
## 漏洞细节
攻击者可以通过远程桌面协议(RDP)连接到目标系统,并发送特制的请求,从而触发远程代码执行问题。
## 影响
此漏洞可被未认证的攻击者利用,导致远程代码执行,具有较高威胁性。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | proof of concept exploit for Microsoft Windows 7 and Server 2008 RDP vulnerability | https://github.com/hook-s3c/CVE-2019-0708-poc | POC详情 |
2 | A Win7 RDP exploit | https://github.com/SherlockSec/CVE-2019-0708 | POC详情 |
3 | CVE-2019-0708 | https://github.com/yetiddbb/CVE-2019-0708-PoC | POC详情 |
4 | CVE-2019-0708-exploit | https://github.com/p0p0p0/CVE-2019-0708-exploit | POC详情 |
5 | Using CVE-2019-0708 to Locally Promote Privileges in Windows 10 System | https://github.com/rockmelodies/CVE-2019-0708-Exploit | POC详情 |
6 | CVE-2019-0708 exp | https://github.com/anquanscan/CVE-2019-0708 | POC详情 |
7 | Dark Net Sunset New Release CVE-2019-0708 | https://github.com/xiyangzuishuai/Dark-Network-CVE-2019-0708 | POC详情 |
8 | CVE-2019-0708 | https://github.com/temp-user-2014/CVE-2019-0708 | POC详情 |
9 | Proof of concept exploit for CVE-2019-0708 | https://github.com/areusecure/CVE-2019-0708 | POC详情 |
10 | Testing my new bot out | https://github.com/pry0cc/cve-2019-0708-2 | POC详情 |
11 | POCexp:https://pan.baidu.com/s/184gN1tJVIOYqOjaezM_VsA 提取码:e2k8 | https://github.com/sbkcbig/CVE-2019-0708-EXPloit | POC详情 |
12 | EXPloit-poc: https://pan.baidu.com/s/184gN1tJVIOYqOjaezM_VsA 提取码:e2k8 | https://github.com/sbkcbig/CVE-2019-0708-EXPloit-3389 | POC详情 |
13 | CVE-2019-0708 | https://github.com/YSheldon/MS_T120 | POC详情 |
14 | 3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check) | https://github.com/k8gege/CVE-2019-0708 | POC详情 |
15 | exploit CVE-2019-0708 RDS | https://github.com/hotdog777714/RDS_CVE-2019-0708 | POC详情 |
16 | RDP POC | https://github.com/jiansiting/CVE-2019-0708 | POC详情 |
17 | PoC exploit for BlueKeep (CVE-2019-0708) | https://github.com/NullByteSuiteDevs/CVE-2019-0708 | POC详情 |
18 | sup pry0cc :3 | https://github.com/thugcrowd/CVE-2019-0708 | POC详情 |
19 | CVE-2019-0708 | https://github.com/blacksunwen/CVE-2019-0708 | POC详情 |
20 | None | https://github.com/infenet/CVE-2019-0708 | POC详情 |
21 | Totally legitimate | https://github.com/n0auth/CVE-2019-0708 | POC详情 |
22 | None | https://github.com/gildaaa/CVE-2019-0708 | POC详情 |
23 | CVE-2019-0708 EXPloit-poc 漏洞描述 微软官方紧急发布安全补丁,修复了一个Windows远程桌面服务的远程代码执行漏洞CVE-2019-0708,该漏洞影响了某些旧版本的Windows系统。此漏洞是预身份验证,无需用户交互。当未经身份验证的攻击者使用RDP(常见端口3389)连接到目标系统并发送特制请求时,可以在目标系统上执行任意命令。甚至传播恶意蠕虫,感染内网其他机器。类似于2017年爆发的WannaCry等恶意勒索软件病毒。 漏洞评级 CVE-2019-0708 严重 安全建议 1、针对Windows 7及Windows Server 2008的用户,及时安装官方安全补丁:https://www.catalog.update.microsoft.com/Search.aspx?q=KB4499175 2、针对Windows 2003及Windows XP的用户,及时更新系统版本或安装官方补丁:https://support.microsoft.com/zh-cn/help/4500705/customer-guidance-for-cve-2019-0708 CVE-2019-0708 EXPloit-poc 影响版本 Windows7 XP Windows 2003 Windows Server 2008 Windows Server 2008 R2 EXPloit-poc: https://pan.baidu.com/s/184gN1tJVIOYqOjaezM_VsA 提取码:e2k8 | https://github.com/sbkcbig/CVE-2019-0708-Poc-exploit | POC详情 |
24 | None | https://github.com/HackerJ0e/CVE-2019-0708 | POC详情 |
25 | PoC about CVE-2019-0708 (RDP; Windows 7, Windows Server 2003, Windows Server 2008) | https://github.com/syriusbughunt/CVE-2019-0708 | POC详情 |
26 | A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. | https://github.com/Barry-McCockiner/CVE-2019-0708 | POC详情 |
27 | A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. | https://github.com/ShadowBrokers-ExploitLeak/CVE-2019-0708 | POC详情 |
28 | CVE-2019-0708 demo | https://github.com/safly/CVE-2019-0708 | POC详情 |
29 | None | https://github.com/Jaky5155/cve-2019-0708-exp | POC详情 |
30 | Powershell script to run and determine if a specific device has been patched for CVE-2019-0708. This checks to see if the termdd.sys file has been updated appropriate and is at a version level at or greater than the versions released in the 5/14/19 patches. | https://github.com/fourtwizzy/CVE-2019-0708-Check-Device-Patch-Status | POC详情 |
31 | POC for CVE-2019-0708 | https://github.com/303sec/CVE-2019-0708 | POC详情 |
32 | PoC for CVE-2019-0708 | https://github.com/f8al/CVE-2019-0708-POC | POC详情 |
33 | CVE-2019-0708漏洞MSF批量巡检插件 | https://github.com/blockchainguard/CVE-2019-0708 | POC详情 |
34 | LOL | https://github.com/yushiro/CVE-2019-0708 | POC详情 |
35 | It's only hitting vulnerable path in termdd.sys!!! NOT DOS | https://github.com/skyshell20082008/CVE-2019-0708-PoC-Hitting-Path | POC详情 |
36 | Announces fraud | https://github.com/ttsite/CVE-2019-0708- | POC详情 |
37 | Report fraud | https://github.com/ttsite/CVE-2019-0708 | POC详情 |
38 | CVE-2019-0708 远程代码执行漏洞批量检测 | https://github.com/biggerwing/CVE-2019-0708-poc | POC详情 |
39 | dump | https://github.com/n1xbyte/CVE-2019-0708 | POC详情 |
40 | High level exploit | https://github.com/freeide/CVE-2019-0708 | POC详情 |
41 | 根据360的程序,整的CVE-2019-0708批量检测 | https://github.com/edvacco/CVE-2019-0708-POC | POC详情 |
42 | My bot (badly written) to search and monitor cve-2019-0708 repositories | https://github.com/pry0cc/BlueKeepTracker | POC详情 |
43 | None | https://github.com/zjw88282740/CVE-2019-0708-win7 | POC详情 |
44 | Scanner PoC for CVE-2019-0708 RDP RCE vuln | https://github.com/victor0013/CVE-2019-0708 | POC详情 |
45 | 根据360Vulcan Team开发的CVE-2019-0708单个IP检测工具构造了个批量检测脚本而已 | https://github.com/herhe/CVE-2019-0708poc | POC详情 |
46 | cve-2019-0708 vulnerablility scanner | https://github.com/l9c/rdp0708scanner | POC详情 |
47 | None | https://github.com/major203/cve-2019-0708-scan | POC详情 |
48 | Check vuln CVE 2019-0708 | https://github.com/SugiB3o/Check-vuln-CVE-2019-0708 | POC详情 |
49 | Goby support CVE-2019-0708 "BlueKeep" vulnerability check | https://github.com/gobysec/CVE-2019-0708 | POC详情 |
50 | Working proof of concept for CVE-2019-0708, spawns remote shell. | https://github.com/smallFunction/CVE-2019-0708-POC | POC详情 |
51 | CVE-2019-0708 PoC Exploit | https://github.com/freeide/CVE-2019-0708-PoC-Exploit | POC详情 |
52 | A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability. | https://github.com/robertdavidgraham/rdpscan | POC详情 |
53 | cve-2019-0708 poc . | https://github.com/closethe/CVE-2019-0708-POC | POC详情 |
54 | 50 first stargazers will get get the tool via email | https://github.com/SQLDebugger/CVE-2019-0708-Tool | POC详情 |
55 | CVE-2019-0708 | https://github.com/Rostelecom-CERT/bluekeepscan | POC详情 |
56 | Only Hitting PoC [Tested on Windows Server 2008 r2] | https://github.com/Leoid/CVE-2019-0708 | POC详情 |
57 | 基于360公开的无损检测工具的可直接在windows上运行的批量检测程序 | https://github.com/ht0Ruial/CVE-2019-0708Poc-BatchScanning | POC详情 |
58 | CVE-2019-0708 bluekeep 漏洞检测 | https://github.com/oneoy/BlueKeep | POC详情 |
59 | None | https://github.com/infiniti-team/CVE-2019-0708 | POC详情 |
60 | None | https://github.com/haishanzheng/CVE-2019-0708-generate-hosts | POC详情 |
61 | Proof of concept for CVE-2019-0708 | https://github.com/Ekultek/BlueKeep | POC详情 |
62 | CVE-2019-0708 | https://github.com/UraSecTeam/CVE-2019-0708 | POC详情 |
63 | A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability. | https://github.com/Gh0st0ne/rdpscan-BlueKeep | POC详情 |
64 | An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits | https://github.com/algo7/bluekeep_CVE-2019-0708_poc_to_exploit | POC详情 |
65 | None | https://github.com/JasonLOU/CVE-2019-0708 | POC详情 |
66 | CVE-2019-0708批量蓝屏恶搞 | https://github.com/AdministratorGithub/CVE-2019-0708 | POC详情 |
67 | CVE-2019-0708 - BlueKeep (RDP) | https://github.com/umarfarook882/CVE-2019-0708 | POC详情 |
68 | Python script to detect bluekeep vulnerability (CVE-2019-0708) with TLS/SSL and x509 support | https://github.com/HynekPetrak/detect_bluekeep.py | POC详情 |
69 | CVE-2019-0708批量检测 | https://github.com/Pa55w0rd/CVE-2019-0708 | POC详情 |
70 | CVE-2019-0708-PoC It is a semi-functional exploit capable of remotely accessing a Windows computer by exploiting the aforementioned vulnerability, this repository also contains notes on how to complete the attack. | https://github.com/at0mik/CVE-2019-0708-PoC | POC详情 |
71 | CVE-2019-0708-Msf-验证 | https://github.com/cream-sec/CVE-2019-0708-Msf-- | POC详情 |
72 | 蓝屏poc | https://github.com/ZhaoYukai/CVE-2019-0708 | POC详情 |
73 | 改写某大佬写的0708蓝屏脚本 改为网段批量蓝屏 | https://github.com/ZhaoYukai/CVE-2019-0708-Batch-Blue-Screen | POC详情 |
74 | None | https://github.com/wdfcc/CVE-2019-0708 | POC详情 |
75 | POC CVE-2019-0708 with python script! | https://github.com/cvencoder/cve-2019-0708 | POC详情 |
76 | None | https://github.com/ze0r/CVE-2019-0708-exp | POC详情 |
77 | Metasploit module for massive Denial of Service using #Bluekeep vector. | https://github.com/mekhalleh/cve-2019-0708 | POC详情 |
78 | CVE-2019-0708 Exploit Tool | https://github.com/cve-2019-0708-poc/cve-2019-0708 | POC详情 |
79 | Scanner PoC for CVE-2019-0708 RDP RCE vuln | https://github.com/andripwn/CVE-2019-0708 | POC详情 |
80 | Public work for CVE-2019-0708 | https://github.com/0xeb-bp/bluekeep | POC详情 |
81 | 收集网上CVE-2018-0708的poc和exp(目前没有找到exp) | https://github.com/ntkernel0/CVE-2019-0708 | POC详情 |
82 | rce exploit , made to work with pocsuite3 | https://github.com/dorkerdevil/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708- | POC详情 |
83 | Research Regarding CVE-2019-0708. | https://github.com/turingcompl33t/bluekeep | POC详情 |
84 | None | https://github.com/fade-vivida/CVE-2019-0708-test | POC详情 |
85 | CVE-2019-0708 BlueKeep漏洞批量扫描工具和POC,暂时只有蓝屏。 | https://github.com/skommando/CVE-2019-0708 | POC详情 |
86 | Metasploit module for CVE-2019-0708 (BlueKeep) - https://github.com/rapid7/metasploit-framework/tree/5a0119b04309c8e61b44763ac08811cd3ecbbf8d/modules/exploits/windows/rdp | https://github.com/RickGeex/msf-module-CVE-2019-0708 | POC详情 |
87 | initial exploit for CVE-2019-0708, BlueKeep CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free The RDP termdd.sys driver improperly handles binds to internal-only channel MS_T120, allowing a malformed Disconnect Provider Indication message to cause use-after-free. With a controllable data/size remote nonpaged pool spray, an indirect call gadget of the freed channel is used to achieve arbitrary code execution. | https://github.com/wqsemc/CVE-2019-0708 | POC详情 |
88 | CVE-2019-0708RDP MSF | https://github.com/Micr067/CVE-2019-0708RDP-MSF | POC详情 |
89 | CVE-2019-0708 With Metasploit-Framework Exploit | https://github.com/FrostsaberX/CVE-2019-0708 | POC详情 |
90 | CVE-2019-0708 RCE远程代码执行getshell教程 | https://github.com/0x6b7966/CVE-2019-0708-RCE | POC详情 |
91 | CVE-2019-0708-EXP(MSF) Vulnerability exploit program for cve-2019-0708 | https://github.com/qing-root/CVE-2019-0708-EXP-MSF- | POC详情 |
92 | None | https://github.com/distance-vector/CVE-2019-0708 | POC详情 |
93 | CVE-2019-0708 C#验证漏洞 | https://github.com/0xFlag/CVE-2019-0708-test | POC详情 |
94 | None | https://github.com/1aa87148377/CVE-2019-0708 | POC详情 |
95 | it works on xp (all version sp2 sp3) | https://github.com/coolboy4me/cve-2019-0708_bluekeep_rce | POC详情 |
96 | ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation ) | https://github.com/Cyb0r9/ispy | POC详情 |
97 | CVE-2019-0708 | https://github.com/lwtz/CVE-2019-0708 | POC详情 |
98 | None | https://github.com/ulisesrc/-2-CVE-2019-0708 | POC详情 |
99 | CVE-2019-0708 (BlueKeep) | https://github.com/worawit/CVE-2019-0708 | POC详情 |
100 | Mass exploit for CVE-2019-0708 | https://github.com/Ameg-yag/Wincrash | POC详情 |
101 | CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell | https://github.com/cbwang505/CVE-2019-0708-EXP-Windows | POC详情 |
102 | 这篇文章将分享Windows远程桌面服务漏洞(CVE-2019-0708),并详细讲解该漏洞及防御措施。作者作为网络安全的小白,分享一些自学基础教程给大家,主要是关于安全工具和实践操作的在线笔记,希望您们喜欢。同时,更希望您能与我一起操作和进步,后续将深入学习网络安全和系统安全知识并分享相关实验。总之,希望该系列文章对博友有所帮助,写文不易,大神们不喜勿喷,谢谢! | https://github.com/eastmountyxz/CVE-2019-0708-Windows | POC详情 |
103 | CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7 | https://github.com/RICSecLab/CVE-2019-0708 | POC详情 |
104 | Scanner CVE-2019-0708 | https://github.com/JSec1337/Scanner-CVE-2019-0708 | POC详情 |
105 | vulnerabilidad CVE-2019-0708 testing y explotacion | https://github.com/nochemax/bLuEkEeP-GUI | POC详情 |
106 | None | https://github.com/AaronCaiii/CVE-2019-0708-POC | POC详情 |
107 | Scan through given ip list | https://github.com/DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit | POC详情 |
108 | None | https://github.com/go-bi/CVE-2019-0708-EXP-Windows | POC详情 |
109 | POC-CVE-2019-0708 | https://github.com/CircuitSoul/CVE-2019-0708 | POC详情 |
110 | None | https://github.com/pywc/CVE-2019-0708 | POC详情 |
111 | None | https://github.com/bibo318/kali-CVE-2019-0708-lab | POC详情 |
112 | None | https://github.com/lisinan988/CVE-2019-0708-scan | POC详情 |
113 | CVE-2019-0708 DOS RDP | https://github.com/5l1v3r1/CVE-2019-0708-DOS | POC详情 |
114 | None | https://github.com/offensity/CVE-2019-0708 | POC详情 |
115 | MS CVE 2019-0708 Python Exploit | https://github.com/CPT-Jack-A-Castle/Haruster-CVE-2019-0708-Exploit | POC详情 |
116 | CVE-2019-0708, A tool which mass hunts for bluekeep vulnerability for exploitation. | https://github.com/Ravaan21/Bluekeep-Hunter | POC详情 |
117 | Checker and exploit for Bluekeep CVE-2019-0708 vulnerability | https://github.com/davidfortytwo/bluekeep | POC详情 |
118 | a simple tool to detect the exploitation of BlueKeep vulnerability (CVE-2019-0708) | https://github.com/tranqtruong/Detect-BlueKeep | POC详情 |
119 | CVE-2019-0708 Exploit With 100% Success Ratio You Can Pay a reasonable Price for my hard Time Gone For this exploit | https://github.com/jdouglas12a/CVE-2019-0708 | POC详情 |
120 | None | https://github.com/rasan2001/CVE-2019-0708 | POC详情 |
121 | None | https://github.com/adyanamul/Remote-Code-Execution-RCE-Exploit-BlueKeep-CVE-2019-0708-PoC | POC详情 |
122 | None | https://github.com/rasan2001/Microsoft-Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708 | POC详情 |
123 | CVE Exploitation Reports: CVE-2007-3280, CVE-2017-0144, CVE-2019-0708 | https://github.com/DenuwanJayasekara/CVE-Exploitation-Reports | POC详情 |
124 | None | https://github.com/hualy13/CVE-2019-0708-Check | POC详情 |
125 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Windows%20%E8%BF%9C%E7%A8%8B%E6%A1%8C%E9%9D%A2%E6%9C%8D%E5%8A%A1%E6%BC%8F%E6%B4%9E%20CVE-2019-0708.md | POC详情 |
126 | None | https://github.com/isabelacostaz/CVE-2019-0708-POC | POC详情 |
暂无评论