Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-35250 PoC — Microsoft Windows Kernel Mode Drivers 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Kernel Mode Drivers 安全漏洞 (CVE-2024-35250)
Description:Microsoft Windows Kernel Mode Drivers是美国微软(Microsoft)公司的Windows内核模式驱动。 Microsoft Windows Kernel Mode Drivers存在安全漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809
Description
PoC for the Untrusted Pointer Dereference in the ks.sys driver
Readme
# CVE-2024-35250
PoC for the Untrusted Pointer Dereference in the ks.sys driver

https://github.com/user-attachments/assets/79e8f3e6-91d5-4145-9a78-1d36248c7284

## Acknowledgements

Credits to the Devcore team and their [research](https://devco.re/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1-en/)
File Snapshot

[4.0K] /data/pocs/0e5d0c17d5f3626aa5b9c932534c4175ff39d33e ├── [3.7K] common.h ├── [ 13K] CVE-2024-35250.cpp └── [ 341] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.