支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: d4b96c26a507a84eb1218b0728d6cad06ec9837a

来源
关联漏洞
标题:Lenovo Diagnostics 缓冲区错误漏洞 (CVE-2022-3699)
Description:Lenovo Diagnostics是中国联想(Lenovo)公司的是联想电脑的扫描以及诊断硬件故障工具。该工具可帮助用户对电脑进行扫描、检查、对电脑的司机问题进行修复的操作,Lenovo Diagnostics还可以帮助用户轻松解决电脑出现的一些蓝屏、死机问题进行修复,能够一键扫描并诊断故障。 Lenovo Diagnostics Driver存在缓冲区错误漏洞,该漏洞源于访问控制不正确。攻击者利用该漏洞可以执行任意物理或虚拟内存的读取和写入。
Description
Proof of Concept exploit for CVE-2022-3699
介绍
# CVE-2022-3699
Proof of Concept exploit for CVE-2022-3699

Exploit tested on Windows 10 22H2 build 19045.4651 and build 19045.3803

Vulnerability deals with allowing unprivileged users to access functionality that lets you read and write from physical memory from the instance of the kernel, however since the primitives deal with physical memory there's a bit of extra work needed to weaponize it

Stole the idea for getting the virtual read primitive from alfarom256 who got it from ch3rn0byl

![image](https://github.com/user-attachments/assets/20cbf2a5-85c4-4e7e-a807-ccadd12b2ca8)
文件快照

[4.0K] /data/pocs/d4b96c26a507a84eb1218b0728d6cad06ec9837a ├── [4.0K] CVE-2022-3699 │   ├── [6.6K] CVE-2022-3699.vcxproj │   ├── [ 977] CVE-2022-3699.vcxproj.filters │   ├── [ 168] CVE-2022-3699.vcxproj.user │   └── [ 10K] Main.cpp ├── [1.4K] CVE-2022-3699.sln └── [ 587] README.md 1 directory, 6 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。