Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-1656 PoC — Microsoft Windows TPM 设备驱动程序信息泄露漏洞

Source
Associated Vulnerability
Title:Microsoft Windows TPM 设备驱动程序信息泄露漏洞 (CVE-2021-1656)
Description:Microsoft Windows是美国微软(Microsoft)公司的一套个人设备使用的操作系统。 Microsoft Windows TPM 设备驱动程序信息泄露漏洞,目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。以下产品及版本受到影响:Windows Server 2012 R2 (Server Core installation),Windows Server 2012 R2 (Server Core installation),Windows Server 2012 R2,Windo
Readme
# POC for CVE-2021-1656, an information disclosure in tpm.sys.
File Snapshot

[4.0K] /data/pocs/b606b7558d62505c731ac95bae53fac824a2e1e7 ├── [4.0K] ipch │   ├── [4.0K] tpm_disclosure-34594d97 │   │   └── [2.8M] tpm_disclosure-97fd2e11.ipch │   └── [4.0K] tpm_disclosure-ae407633 │   ├── [2.8M] tpm_disclosure-39beb399.ipch │   └── [2.8M] tpm_disclosure-97fd2e11.ipch ├── [ 63] README.md ├── [4.0K] TPM_Disclosure │   ├── [1.6K] DumpHex.cpp │   ├── [ 993] Header.h │   ├── [1.7K] ReadMe.txt │   ├── [ 293] stdafx.cpp │   ├── [ 305] stdafx.h │   ├── [ 306] targetver.h │   ├── [1.4K] TPM_Disclosure.cpp │   ├── [7.6K] TPM_Disclosure.vcxproj │   ├── [1.4K] TPM_Disclosure.vcxproj.filters │   └── [4.0K] x64 │   └── [4.0K] Release │   ├── [2.7K] cl.command.1.tlog │   ├── [ 38K] CL.read.1.tlog │   ├── [2.5K] CL.write.1.tlog │   ├── [ 76K] DumpHex.obj │   ├── [2.1K] link.command.1.tlog │   ├── [ 2] link-cvtres.read.1.tlog │   ├── [ 2] link-cvtres.write.1.tlog │   ├── [ 2] link-rc.read.1.tlog │   ├── [ 2] link-rc.write.1.tlog │   ├── [4.1K] link.read.1.tlog │   ├── [1.0K] link.write.1.tlog │   ├── [ 30K] stdafx.obj │   ├── [ 100] TPM_Disclosure.lastbuildstate │   ├── [1.4K] TPM_Disclosure.log │   ├── [ 75K] TPM_Disclosure.obj │   ├── [1.2M] TPM_Disclosure.pch │   └── [196K] vc110.pdb ├── [ 32M] TPM_Disclosure.sdf ├── [1.2K] TPM_Disclosure.sln ├── [ 31K] TPM_Disclosure.v11.suo └── [4.0K] x64 └── [4.0K] Release ├── [9.5K] TPM_Disclosure.exe └── [331K] TPM_Disclosure.pdb 8 directories, 35 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.