Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-0708 PoC — Microsoft Remote Desktop Services 资源管理错误漏洞

Source
Associated Vulnerability
Title:Microsoft Remote Desktop Services 资源管理错误漏洞 (CVE-2019-0708)
Description:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。Remote Desktop Services是其中的一个远程桌面服务组件。 Microsoft Remote Desktop Services中存在资源管理错误漏洞。该漏洞源于网络系统或产品对系统资源(如内存、磁盘空间、文件等)的管理不当。以下
Description
蓝屏poc
Readme
# CVE-2019-0708
蓝屏poc

Windows 7 64位 已经测试〜

命令:python crashpoc.py ip 64

![image](https://github.com/shun-gg/CVE-2019-0708/blob/master/poc.png)

![image](https://github.com/shun-gg/CVE-2019-0708/blob/master/win7.png)


https://github.com/n1xbyte/CVE-2019-0708/

Leaving for a wedding tomorrow, if I can't find anything then someone else take the reins

Going to drop the crash PoC here Friday if there isnt one public already... Maybe the following week, depending on if the vulnerable numbers drop consistently or not.
  
https://vimeo.com/339425966  
  
I'm not responsible for what you use this to accomplish and should only be used for education purposes  
didn't port the socket to talk to server 2003 and win xp but should be straight forward if you wanted (Add security exchange PDU and do the math)
File Snapshot

[4.0K] /data/pocs/c6972e192fa9bc6fe477529112962690fc4cc003 ├── [ 16K] crashpoc.py ├── [111K] poc.png ├── [ 13K] poc.py ├── [ 829] README.md └── [ 20K] win7.png 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.