Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-0213 PoC — Microsoft Windows COM 权限许可和访问控制问题漏洞

Source
Associated Vulnerability
Title:Microsoft Windows COM 权限许可和访问控制问题漏洞 (CVE-2017-0213)
Description:Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。Windows COM Aggregate Marshaler是其中的一个组件。 Microsoft Windows中的Windows COM Aggregate Marshaler存在提权漏洞。本地攻击者可通过运行特制的应用程序利用该漏洞在应用程序上下文中执行任意任意代码。以下版本受到影响:Microsoft Windows Server 2008 SP2和R2 SP1;Windows 7 SP1;Windows
Description
Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.
Readme
# CVE-2017-0213: Windows COM Elevation of Privilege Vulnerability

## Description

**Author:** Google Security Research

**CVE:** 2017-0213

**EDB-ID:** 42020

**References:** [Project-Zero](https://bugs.chromium.org/p/project-zero/issues/detail?id=1107) [Microsoft](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0213) [Exploit-Database](https://www.exploit-db.com/exploits/42020/)

**Video:** [Youtube](https://youtu.be/6naFH9MQHy8)




## Affected Products

| Product             | Version | Update | Build | Tested |
| :------------------ | :------ | :----- | :---- | :----- |
| Windows 10          | 1511    |        | 10586 | √      |
| Windows 10          | 1607    |        | 14393 | √      |
| Windows 10          | 1703    |        | 15063 | √      |
| Windows 7           |         | SP1    |       | √      |
| Windows 8.1         |         |        |       |        |
| Windows RT 8.1      |         |        |       |        |
| Windows Server 2008 |         | SP2    |       |        |
| Windows Server 2008 | R2      | SP1    |       |        |
| Windows Server 2012 |         |        |       |        |
| Windows Server 2012 | R2      |        |       |        |
| Windows Server 2016 |         |        |       |        |

## Exploits

**x86 Exe:** [Download](https://github.com/Rylie7021/CVE-2017-0213/blob/master/CVE-2017-0213_x86.exe)

SHA256: 67824ca4b91897a8b2cb5cea916fa0ded010355f57110c2c50e9787324199949

**x64 Exe:** [Download](https://github.com/Rylie7021/CVE-2017-0213/blob/master/CVE-2017-0213_x64.exe)

SHA256: 64f8c52433718c83a7818b1c22c6d60bcc06d0a72b6582f7e5da5f02acfa8987


**x86 Zip:** [Download](https://github.com/WindowsExploits/Exploits/raw/master/CVE-2017-0213/Binaries/CVE-2017-0213_x86.zip)

SHA256: 67824ca4b91897a8b2cb5cea916fa0ded010355f57110c2c50e9787324199949

**x64 Zip:** [Download](https://github.com/WindowsExploits/Exploits/raw/master/CVE-2017-0213/Binaries/CVE-2017-0213_x64.zip)

SHA256: 64f8c52433718c83a7818b1c22c6d60bcc06d0a72b6582f7e5da5f02acfa8987

File Snapshot

[4.0K] /data/pocs/763754ba6bb855ee445b8f167f9304e1b57c7ac3 ├── [201K] CVE-2017-0213_x64 Antivirus Bypassed.rar ├── [157K] CVE-2017-0213_x64.exe ├── [132K] CVE-2017-0213_x86.exe └── [2.0K] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.