Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-4113 PoC — Microsoft Windows Win32k.sys 特权提升漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Win32k.sys 特权提升漏洞 (CVE-2014-4113)
Description:Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。win32k.sys是Windows子系统的内核部分,是一个内核模式设备驱动程序,它包含有窗口管理器、后台控制窗口和屏幕输出管理等。 如果Windows内核模式驱动程序不正确地处理内存中的对象,则存在一个特权提升漏洞。成功利用此漏洞的攻击者可以运行内核模式中的任意代码。攻击者随后可安装程序;查看、更改或删除数据;或者创建拥有完全管理权限的新帐户。
Description
Trigger and exploit code for CVE-2014-4113
Readme
# CVE-2014-4113
Trigger and exploit code for CVE-2014-4113
File Snapshot

[4.0K] /data/pocs/1d6f29a45b8829fae368f6f32d0068733c71eaa0 ├── [4.0K] Exploit │   ├── [4.0K] Exploit │   │   ├── [ 13K] Exploit.cpp │   │   ├── [4.3K] Exploit.vcxproj │   │   ├── [1.3K] Exploit.vcxproj.filters │   │   ├── [1.6K] ReadMe.txt │   │   ├── [ 286] stdafx.cpp │   │   ├── [ 305] stdafx.h │   │   └── [ 306] targetver.h │   ├── [ 973] Exploit.sln │   └── [ 18K] Exploit.v12.suo ├── [1.1K] LICENSE ├── [ 59] README.md └── [4.0K] Trigger ├── [4.0K] Trigger │   ├── [1.6K] ReadMe.txt │   ├── [ 286] stdafx.cpp │   ├── [ 305] stdafx.h │   ├── [ 306] targetver.h │   ├── [8.2K] Trigger.cpp │   ├── [4.3K] Trigger.vcxproj │   └── [1.3K] Trigger.vcxproj.filters ├── [ 20] Trigger.opensdf ├── [ 973] Trigger.sln └── [ 18K] Trigger.v12.suo 4 directories, 21 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.