Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-6008 PoC — Sophos HitmanPro.Alert solution和Sophos Clean SurfRight HitmanPro 安全漏洞

Source
Associated Vulnerability
Title:Sophos HitmanPro.Alert solution和Sophos Clean SurfRight HitmanPro 安全漏洞 (CVE-2017-6008)
Description:Sophos HitmanPro.Alert solution和Sophos Clean都是英国Sophos公司的病毒防护软件。SurfRight HitmanPro是其中的一个恶意软件扫描工具。 Sophos HitmanPro.Alert solution和Sophos Clean中的SurfRight HitmanPro 3.7.20 Build 286之前的版本的hitmanpro37.sys存在安全漏洞。本地攻击者可借助畸形的IOCTL调用利用该漏洞提升权限。
Description
Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.
Readme
# Exploit-CVE-2017-6008

The CVE-2017-6008 is a vulnerability in the HitmanPro scan that allows privilege escalation by exploiting a kernel pool buffer overflow.
The exploits here use the Quota Process Pointer Overwrite attack as described in the [Tarjei Mandt's paper](http://www.mista.nu/research/MANDT-kernelpool-PAPER.pdf)

Also, the exploits use my [Pool sprayer library](https://github.com/cbayet/PoolSprayer)

You can find a detailed paper on the Windows 7 exploit [here](https://www.gatewatcher.com/en/news/blog/kernel-pool-overflow-exploitation-in-real-world-windows-7)


# Windows 10 version

This version use another vulnerability in the hitmanpro37.sys driver, an Out-Of-Bounds read, which we use to leak the Pool Cookie.
This leak allows us to use the very same attack on Windows 10.

You can find a detailed paper of the exploit on Windows 10 [here](https://trackwatch.com/kernel-pool-overflow-exploitation-in-real-world-windows-10/)

# Update

The exploit used a technique described by Cesar Cerrudo in 2012 to elevate it's privileges by setting the field Privileges.Enabled of the TOKEN structure.

However, since Windows 10 v1607, the kernel now also checks the value of the Privileges.Present field of the Token.
The Privileges.Present field of the token is the list of privileges that CAN be enabled for this token, by using the AdjustTokenPrivileges API.
So the actual privileges of the TOKEN is now the bitfield resulting of Privileges.Present & Privileges.Enabled.

This means that the exploit in this current state doesn't work anymore since Windows 10 v1607.
Also, the exploit is also broken by the changes that happend in the pool since Windows 19H1, with the arrival of the segment heap in the kernel.

Updated work on Kernel pool exploitation since 19H1 is coming soon !
File Snapshot

[4.0K] /data/pocs/a0e107ce3a71b5ecb3e6e6a0f45a650a2bed64a4 ├── [6.9M] HitmanPro_x64_vulnerable.zip ├── [1.8K] README.md ├── [4.0K] Win10 │   ├── [4.0K] bin │   │   ├── [252K] CVE-2017-6008_Win10_Exploit.exe │   │   └── [128K] CVE-2017-7441_Win10_LeakCookie.exe │   └── [4.0K] src │   ├── [ 19K] CVE-2017-6008_Win10_Exploit.cpp │   └── [3.6K] CVE-2017-7441_Win10_LeakCookie.cpp ├── [4.0K] Win7 │   ├── [4.0K] bin │   │   └── [248K] CVE-2017-6008_Win7_Exploit.exe │   └── [4.0K] src │   └── [ 13K] CVE-2017-6008_Win7_Exploit.cpp └── [1.2M] Windows10PoolParty.pdf 6 directories, 9 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.