Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-4113 PoC — Microsoft Windows Win32k.sys 特权提升漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Win32k.sys 特权提升漏洞 (CVE-2014-4113)
Description:Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。win32k.sys是Windows子系统的内核部分,是一个内核模式设备驱动程序,它包含有窗口管理器、后台控制窗口和屏幕输出管理等。 如果Windows内核模式驱动程序不正确地处理内存中的对象,则存在一个特权提升漏洞。成功利用此漏洞的攻击者可以运行内核模式中的任意代码。攻击者随后可安装程序;查看、更改或删除数据;或者创建拥有完全管理权限的新帐户。
Description
Exploit CVE-2014-4113
Readme
# Exploit-CVE-2014-4113

CVE-2014-4113 is a Local & Privilege Escalation Exploits. You can get the SYSTEM Privilege.

support platform: x86; windows xp and windowx 7

usage:

1. ��cmd.exe���л�����ǰ��������Ŀ¼��ִ���������
cve-2014-4113.exe [target program name]

for example:
cve-2014-4113.exe calc.exe


File Snapshot

[4.0K] /data/pocs/5a90f3a3089c1a2c949b68538484abdcb00a77d0 ├── [4.0K] cve-2014-4113 │   ├── [4.1K] cve-2014-4113.vcxproj │   ├── [ 924] cve-2014-4113.vcxproj.filters │   ├── [ 162] cve-2014-4113.vcxproj.user │   ├── [4.0K] Debug │   │   ├── [1.6K] cve-2014-4113.log │   │   └── [4.0K] cve-2014-4113.tlog │   │   └── [ 160] cve-2014-4113.lastbuildstate │   └── [ 13K] main.cpp ├── [ 963] cve-2014-4113.sln ├── [ 20K] cve-2014-4113.v12.suo ├── [4.0K] Debug │   └── [530K] cve-2014-4113.exe ├── [ 313] README.md └── [ 383] removejunk.bat 4 directories, 11 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.