支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%

POC详情: d764b2ae8266f52551ec042e7008bda39f6cafae

来源
关联漏洞
标题:Microsoft Remote Desktop Client 安全漏洞 (CVE-2024-38077)
描述:Microsoft Remote Desktop Client是美国微软(Microsoft)公司的一款远程桌面客户端。 Microsoft Remote Desktop Client存在安全漏洞。攻击者利用该漏洞可以远程执行代码。以下产品和版本受到影响:Windows Server 2019,Windows Server 2019 (Server Core installation),Windows Server 2022,Windows Server 2022 (Server Core install
描述
CVE-2024-38077: Remote Code Execution Vulnerability in Windows Remote Desktop Licensing Service
介绍
# CVE-2024-38077
### Here’s a possible GitHub description for CVE-2024-38077:
CVE-2024-38077: Remote Code Execution Vulnerability in Windows Remote Desktop Licensing Service

## Overview:
CVE-2024-38077 is a critical vulnerability in the Windows Remote Desktop Licensing Service, which allows remote attackers to execute arbitrary code on vulnerable systems. This vulnerability is due to a heap overflow in the service when processing specific inputs. Exploiting this flaw could lead to full system compromise, allowing attackers to take control without requiring authentication.

## Affected Systems:
- Windows Server 2016
- Windows Server 2019
- Windows Server 2022
- Windows 10/11 with Remote Desktop Licensing installed
  
## Exploitation:
Attackers can exploit this vulnerability by sending specially crafted messages to the affected service, triggering a heap overflow that leads to remote code execution (RCE). This makes it particularly dangerous, as the attacker could potentially run arbitrary code with system-level privileges.

## Mitigation:
Microsoft has addressed this issue in their latest security patch. Users are strongly encouraged to update their systems immediately to prevent exploitation.

## Proof of Concept (PoC):
This repository includes a PoC that demonstrates how the vulnerability can be triggered. Note: For educational purposes only.
文件快照

[4.0K] /data/pocs/d764b2ae8266f52551ec042e7008bda39f6cafae ├── [ 11K] poc.py └── [1.3K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。