Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-1458 PoC — Microsoft Windows Win32k组件安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Win32k组件安全漏洞 (CVE-2019-1458)
Description:Microsoft Windows Win32k是美国微软(Microsoft)公司的一个用于Windows多用户管理的系统文件。 Microsoft win32k组件中存在安全漏洞,该漏洞源于程序无法正确处理内存中的对象。攻击者可通过运行特制的应用程序利用该漏洞在内核模式中运行任意代码。以下产品及版本受到影响:Microsoft Windows 10,Windows 10版本1607,Windows 7 SP1,Windows 8.1,Windows RT 8.1,Windows Server 2008
Description
CVE-2019-1458 Windows LPE Exploit
Readme
# CVE-2019-1458 Windows LPE Exploit

## Caution

* **YOU ONLY HAVE ONE CHANCE TO EXPLOIT FOR EACH KERNEL REBOOT!!!!**

## Screenshot

![exploit](https://raw.githubusercontent.com/unamer/CVE-2019-1458/master/exp.png)

## Supported Version

* Windows 2012 R2 (Tested)
* Windows 8 (Tested)
* Windows 2008 R2 x64(Tested)
* Windows 7.1 x64 (Tested)
* Windows 7 x64
* Windows 2012 x64
* Windows 2008 x64
* ALL X32 VERSION SYSTEMS ARE NOT SUPPORTED (Who uses x32 system nowadays?)

## Issues

* Kernel might crash when rebooting system after exploit 

## Reference
* https://github.com/piotrflorczyk/cve-2019-1458_POC
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1458

File Snapshot

[4.0K] /data/pocs/40372ca07fd3176e7d2a1e4e73a54643996dfe3c ├── [4.0K] cve-2019-1458 │   ├── [7.4K] cve-2019-1458.vcxproj │   ├── [1.0K] cve-2019-1458.vcxproj.filters │   ├── [ 165] cve-2019-1458.vcxproj.user │   ├── [ 438] shellcode.asm │   └── [ 13K] Source.cpp ├── [1.3K] cve-2019-1458.sln ├── [2.5M] exp.png ├── [1.0K] LICENSE ├── [ 675] README.md └── [4.0K] x64 └── [4.0K] Release └── [ 94K] cve-2019-1458.exe 3 directories, 10 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.