POC详情: 1919dcd797b33ade610fe1977a003aace2cfe1d8

来源
关联漏洞
标题: Microsoft Windows 内核安全漏洞 (CVE-2020-1034)
描述:Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。 Windows 内核存在安全漏洞,该漏洞源于处理内存对象的方式中存在特权提升漏洞,攻击者可利用该漏洞执行代码。以下产品及版本受到影响: Windows 10 1909版本, Windows 10 1709版本, Windows Server 1909版本, Windows Server 1903版本, Windows Server 2004版本, Windows 10 2004版本, Windows 10 180
描述
CVE 2020-1034 exploit and presentation
介绍
# CVE-2020-1034

> **Warning**
> *This repository contains a working exploit. Publication was made for educational purposes only. Owner of this repository is not responsible for any damage done by any part of source code published here.*

***This repository was created as a homework for "Protected Information Systems" course in National Research Nuclear University MEPhI.***

CVE 2020-1034 exploit and presentation.

## Brief description

An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability' \[1].

More info: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1034

## References

1. [MITRE CVE-2020-1034][1]


[1]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1034
文件快照

[4.0K] /data/pocs/1919dcd797b33ade610fe1977a003aace2cfe1d8 ├── [379K] CVE 2020-1034.pdf ├── [4.0K] exploit │   ├── [4.0K] CVE-2020-1034-exploit │   │   ├── [8.0K] CVE-2020-1034-exploit.vcxproj │   │   ├── [1.5K] CVE-2020-1034-exploit.vcxproj.filters │   │   ├── [ 165] CVE-2020-1034-exploit.vcxproj.user │   │   ├── [2.1K] error.inl │   │   ├── [4.9K] main.cpp │   │   ├── [9.4K] native.h │   │   ├── [ 17] pch.cpp │   │   ├── [ 459] pch.h │   │   ├── [6.7K] utils.cpp │   │   └── [ 415] utils.h │   └── [1.4K] CVE-2020-1034.sln ├── [1.0K] LICENSE ├── [4.0K] presentation │   ├── [8.3K] CVE 2020-1034.tex │   └── [4.0K] images │   ├── [ 35K] elevated-privileges.png │   ├── [ 19K] exploit.png │   ├── [ 13K] mephi-logo.png │   └── [177K] working.png └── [ 806] README.md 4 directories, 19 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。