Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-29050 PoC — Microsoft Windows Cryptographic Services 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Cryptographic Services 安全漏洞 (CVE-2024-29050)
Description:Microsoft Windows Cryptographic Services是美国微软(Microsoft)公司的加密服务提供程序。 Microsoft Windows Cryptographic Services存在安全漏洞。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-base
Description
CVE-2024-29050 is a vulnerability found in the Windows Cryptographic Services.
Readme
# CVE-2024-29050
CVE-2024-29050 is a security vulnerability in Windows' cryptographic services, particularly in how certificates are processed during cryptographic operations. The issue stems from an integer overflow, which occurs when calculations on data like file sizes or buffer lengths exceed the allowable limit for a variable, causing the system to miscalculate or mismanage memory.

In this case, the cryptographic function mishandles certain certificate data, leading to incorrect memory management. Attackers could exploit this flaw by feeding the system specially crafted inputs (e.g., oversized certificates or manipulated data fields), causing the system to overwrite memory sections. This could lead to unexpected behavior, such as crashing the system or, in more serious cases, allowing attackers to execute malicious code remotely.

Think of it like a calculator designed to handle only numbers up to a certain size, but if you input a number beyond that limit, it "wraps around" and gives incorrect results. Similarly, the system miscalculates how much memory to allocate or free, leading to vulnerabilities that an attacker could take advantage of.
File Snapshot

[4.0K] /data/pocs/c32eac39bfdd7cdc073191ae617ab12a43e3998e ├── [ 916] POC.c └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.