POC详情: 1017653d7233cd7245ad408d7c57002192086b19

来源
关联漏洞
标题: Microsoft Windows TCP/IP component 安全漏洞 (CVE-2021-24086)
描述:Microsoft Windows TCP/IP component是美国微软(Microsoft)公司的一个为Windows提供TCP/IP配置功能的组件。 Microsoft Windows TCP/IP component 中存在安全漏洞。以下产品和版本受到影响:Windows 10 Version 1803 for 32-bit Systems,Windows 10 Version 1803 for x64-based Systems,Windows 10 Version 1803 for ARM
描述
Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.
介绍
# CVE-2021-24086

This is a proof of concept for [CVE-2021-24086](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24086) ("Windows TCP/IP Denial of Service Vulnerability
"), a NULL dereference in `tcpip.sys` patched by Microsoft in February 2021. According to this [tweet](https://twitter.com/metr0/status/1359214923541192704), the vulnerability has been found by [@piazzt](https://twitter.com/piazzt). It is triggerable remotely by sending malicious UDP packet over IPv6.

![trigger](pics/trigger.gif)

You can read Microsoft's blog here: [Multiple Security Updates Affecting TCP/IP:  CVE-2021-24074, CVE-2021-24094, and CVE-2021-24086](https://msrc-blog.microsoft.com/2021/02/09/multiple-security-updates-affecting-tcp-ip/). It discusses briefly the impact and workaround/mitigations.

A more in-depth discussion about the root-cause is available on [doar-e.github.io](https://doar-e.github.io/): [Reverse-engineering tcpip.sys: mechanics of a packet of the death (CVE-2021-24086)](https://doar-e.github.io/blog/2021/04/15/reverse-engineering-tcpipsys-mechanics-of-a-packet-of-the-death-cve-2021-24086/).

![doare](pics/doare.png)

## Running the PoC

Run the `cve-2021-24086.py` script; it requires [Scapy](https://github.com/secdev/scapy):

```
over@bubuntu:~$ sudo python3 cve-2021-24086.py
66 fragments, total size 0xfff8
..................................................................
Sent 66 packets.
.
Sent 1 packets.
```

# Authors

* Axel '[@0vercl0k](https://twitter.com/0vercl0k)' Souchet
文件快照

[4.0K] /data/pocs/1017653d7233cd7245ad408d7c57002192086b19 ├── [4.0K] binaries │   ├── [1.9M] tcpip.rel2101.pdb │   ├── [2.9M] tcpip.rel2101.sys │   ├── [1.9M] tcpip.rel2102.pdb │   └── [2.9M] tcpip.rel2102.sys ├── [ 13K] cve-2021-24086.py ├── [1.0K] LICENSE ├── [4.0K] pics │   ├── [278K] doare.png │   └── [412K] trigger.gif └── [1.5K] README.md 2 directories, 9 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。