Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-4076 PoC — Microsoft TCP/IP 特权提升漏洞

Source
Associated Vulnerability
Title:Microsoft TCP/IP 特权提升漏洞 (CVE-2014-4076)
Description:TCP/IP(Transmission Control Protocol/Internet Protocol,传输控制协议/因特网互联协议或网络通讯协议),它包含了一系列构成互联网基础的网络协议。 当TCP/IP堆栈在处理IOCTL期间未能正确处理内存中的对象时,导致Windows TCP/IP 堆栈(tcpip.sys、tcpip6.sys)中存在特权提升漏洞。以下产品受到影响:Microsoft Windows Server 2003 SP2版本。
Description
Windows 2k3 tcpip.sys Privilege Escalation
Readme
# CVE-2014-4076 PoC

This proof of concept directly copied from its [original python version](http://www.exploit-db.com/exploits/35936/) and rewritten in C++.

## Build

This project is built with Visual Studio 2013 Update 4.

## Notice

Only users that in Administrators group can open the device and perform IO controls, which means **the exploit only escalate Administrators to SYSTEM, and does not help in a webshell environment at all**.

Special thanks to [@KingsleyChen](https://github.com/kingsamchen) for help.
File Snapshot

[4.0K] /data/pocs/2f9caef0ba057bcbefa1b15d2037cf7c71f424f1 ├── [4.0K] CVE-2014-4076 │   ├── [4.9K] CVE-2014-4076.cpp │   ├── [4.1K] CVE-2014-4076.vcxproj │   ├── [1.3K] CVE-2014-4076.vcxproj.filters │   ├── [ 292] stdafx.cpp │   ├── [ 305] stdafx.h │   └── [ 306] targetver.h ├── [1.0K] CVE-2014-4076.sln └── [ 519] README.md 1 directory, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.