Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-1701 PoC — Microsoft Windows Win32k 特权提升漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Win32k 特权提升漏洞 (CVE-2015-1701)
Description:Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。 当Microsoft Windows Win32k.sys内核模式驱动程序不正确地处理内存中的对象时,存在一个特权提升漏洞。成功利用此漏洞的攻击者可以运行内核模式中的任意代码。攻击者可随后安装程序;查看、更改或删除数据;或者创建拥有完全用户权限的新帐户。以下系统受到影响:Microsoft Windows Server 2003 SP2,Vista SP2,Server 2008 SP2。
Description
Unspecified vulnerability in Microsoft Windows before 8 allows local users to gain privileges via unknown vectors, as exploited in the wild in April 2015   (Base Score: 7.2 HIGH)   Current Description Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability 
Readme
# CVE-2015-1701
## Win32k Elevation of Privilege Vulnerability.

Original info https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html

# Protection

Apply MS15-051 for fix.
https://technet.microsoft.com/library/security/MS15-051


#CVE Dictionary Entry:
CVE-2015-1701
NVD Published Date:
04/21/2015
NVD Last Modified:
05/14/2020
Source:
Microsoft Corporation

## Follow on:
<p align="left">
<a href="https://github.com/Anonymous-Family"><img src="https://img.shields.io/badge/GitHub-Follow%20on%20GitHub-inactive.svg?logo=github"></a>
</p><p align="left">
<a href="https://www.facebook.com/kali14562/"><img src="https://img.shields.io/badge/Facebook-Follow%20on%20Facebook-blue.svg?logo=facebook"></a>
</p><p align="left">
<a href="https://t.me/+cfFn8OTSF65jZDM0"><img src="https://img.shields.io/badge/Telegram-Contact%20Telegram%20Profile-blue.svg?logo=telegram"></a>
</p><p align="left"> 
File Snapshot

[4.0K] /data/pocs/20757df393f8ab2e087d7beb6237a33e07c7cad0 ├── [ 40K] CVE-2015-1701-master.zip ├── [1.0K] CVE-2015-1701.sha256 ├── [1.3K] LICENSE ├── [1.3K] LICENSE.md └── [ 915] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.