Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-19320 PoC — 多款GIGABYTE产品访问控制错误漏洞

Source
Associated Vulnerability
Title:多款GIGABYTE产品访问控制错误漏洞 (CVE-2018-19320)
Description:GIGABYTE APP Center等都是中国技嘉科技(GIGABYTE Technology)公司的产品。GIGABYTE APP Center是一款用于管理、更新技嘉产品工具程序的软件。AORUS GRAPHICS ENGINE是一款显卡超频软件。 多款GIGABYTE产品中的GDrv低级别驱动程序存在安全漏洞。攻击者可利用该漏洞完全控制受影响的系统。以下产品和版本受到影响:GIGABYTE APP Center 1.05.21及之前版本;AORUS GRAPHICS ENGINE 1.33及之前版
Description
CVE-2018-19320 LPE Exploit
Readme
# CVE-2018-19320 LPE Exploit

## Description

Local Privilege Escalation Exploit of CVE-2018-19320. The exploit uses the exposed functions in **gdrv.sys** that allow a low-level user to allocate and write data to memory for escalating the privileges to SYSTEM. 



## ScreenShot

**Tested on:**  Windows 10 x64 21H1 (OS Build 1903.1165)

![image-20210819200340188](img/image-20210819200340188.png)



## Affected Versions

- GIGABYTE APP Center v1.05.21 and previous
- AORUS GRAPHICS ENGINE v1.33 and previous
- XTREME GAMING ENGINE v1.25 and previous
- OC GURU II v2.08



## Credits

The vulnerability was discoverd by Diego Juarez

Adviosry: https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-of-privilege-vulnerabilities/

File Snapshot

[4.0K] /data/pocs/a4411c1db95e1b82e44b8e207c47b1902781e1d3 ├── [4.0K] CVE-2018-19320-LPE-Exploit │   ├── [4.0K] CVE-2018-19320-LPE-Exploit │   │   ├── [5.9K] CVE-2018-19320-LPE-Exploit.cpp │   │   ├── [6.9K] CVE-2018-19320-LPE-Exploit.vcxproj │   │   ├── [ 969] CVE-2018-19320-LPE-Exploit.vcxproj.filters │   │   └── [ 165] CVE-2018-19320-LPE-Exploit.vcxproj.user │   └── [1.4K] CVE-2018-19320-LPE-Exploit.sln ├── [4.0K] img │   └── [312K] image-20210819200340188.png └── [ 746] README.md 3 directories, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.