关联漏洞
标题:Microsoft Windows和Windows Server 缓冲区错误漏洞 (CVE-2020-1283)Description:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。 Microsoft Windows和Windows Server中存在拒绝服务漏洞,该漏洞源于程序没有正确处理内存中的对象。攻击者可借助特制应用程序利用该漏洞导致目标系统停止响应。以下产品及版本受到影响:Microsoft Windows Se
Description
Exploit Code for CVE-2020-1283 - Windows-Denial-of-Service-Vulnerability
介绍
# CVE-2020-8103 Exploit
The write up can be found in the blog of the RedyOps Labs:
https://labs.redyops.com/index.php/2020/04/27/dos-via-arbitrary-folder-creation/
### Third Party Tools
This exploit code, is heavily based on symboliclink-testing-tools which was Developed by James Forshaw. The symboliclink-testing-tools can be found here:
https://github.com/googleprojectzero/symboliclink-testing-tools
文件快照
[4.0K] /data/pocs/2f6711a50df29f455dd34ffcf445b71b9ee2c45c
├── [5.5M] PoC.mkv
├── [ 409] README.md
└── [4.0K] src
├── [4.0K] CommonUtils
│ ├── [3.7K] CommonUtils.cpp
│ ├── [1.0K] CommonUtils.h
│ ├── [4.8K] CommonUtils.vcxproj
│ ├── [2.7K] CommonUtils.vcxproj.filters
│ ├── [ 168] CommonUtils.vcxproj.user
│ ├── [2.0K] DirectoryObject.cpp
│ ├── [4.5K] FileOpLock.cpp
│ ├── [ 789] FileOpLock.h
│ ├── [5.0K] FileSymlink.cpp
│ ├── [ 588] FileSymlink.h
│ ├── [1.6K] Hardlink.cpp
│ ├── [2.0K] NativeSymlink.cpp
│ ├── [2.2K] ntimports.h
│ ├── [5.2K] RegistrySymlink.cpp
│ ├── [ 13K] ReparsePoint.cpp
│ ├── [1.2K] ReparsePoint.h
│ ├── [1.8K] ScopedHandle.cpp
│ ├── [ 498] ScopedHandle.h
│ ├── [ 298] stdafx.cpp
│ ├── [ 270] stdafx.h
│ ├── [ 314] targetver.h
│ └── [1.3K] typed_buffer.h
├── [4.0K] Exploit
│ ├── [5.3K] Exploit.cpp
│ ├── [1.2K] Exploit.filters
│ ├── [ 168] Exploit.user
│ ├── [5.0K] Exploit.vcxproj
│ ├── [ 168] Exploit.vcxproj.user
│ ├── [ 300] stdafx.cpp
│ ├── [ 462] stdafx.h
│ └── [ 314] targetver.h
└── [1.5K] MS_Recent_Libraries_FC.sln
3 directories, 33 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。