Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-0708 PoC — Microsoft Remote Desktop Services 资源管理错误漏洞

Source
Associated Vulnerability
Title:Microsoft Remote Desktop Services 资源管理错误漏洞 (CVE-2019-0708)
Description:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。Remote Desktop Services是其中的一个远程桌面服务组件。 Microsoft Remote Desktop Services中存在资源管理错误漏洞。该漏洞源于网络系统或产品对系统资源(如内存、磁盘空间、文件等)的管理不当。以下
Description
CVE-2019-0708 (BlueKeep)
Readme
# CVE-2019-0708 (BlueKeep)

~~Currently, I public only the exploitation note for Windows 7 x64 only.~~ See [NOTE.md](NOTE.md)

**Note:** Windows 2008 R2 with default configuration (fDisableCam=1) can be exploited. Reliability is same as Windows 7.

## Update (July 2020)

- Add info for Windows Server 2008 to [NOTE.md](NOTE.md)
- Add PoCs for filling target kernel unpaged pool
- Add script for detecting target info
- Add PoC code execution on Windows 7 x86

#### Files

 * **myrdp.py** My RDP library (messy)
 * **myasn1.py** My ASN.1 for RDP (required by myrdp.py)
 * **rdp4mppc.py** MPPC-Based Bulk Data Compression for RDP 4.0
 * **rdp_detect_info.py** For detecting info related to vulnerability from RDP server
 * **poc_rdpsnd.py** PoC code execution on Windows 7 x86
 * **poc_rdpsnd_fill.py** PoC for filling kernel nonpaged pool over RDPSND channel
 * **poc_rdpdr_fill.py** PoC for filling kernel nonpaged pool over RDPDR channel
 * **poc_refreshrect_fill.py** PoC for filling kernel nonpaged pool with REFRESHRECT pdu
File Snapshot

[4.0K] /data/pocs/92afe27eba27e194b0e7f301fbb63516f85b12de ├── [2.9K] myasn1.py ├── [ 43K] myrdp.py ├── [7.1K] NOTE.md ├── [1.6K] poc_rdpdr_fill.py ├── [ 789] poc_rdpsnd_fill.py ├── [3.7K] poc_rdpsnd.py ├── [ 487] poc_refreshrect_fill.py ├── [7.9K] rdp4mppc.py ├── [5.7K] rdp_detect_info.py └── [1.0K] README.md 0 directories, 10 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.