Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-38077 PoC — Microsoft Remote Desktop Client 安全漏洞

Source
Associated Vulnerability
Title:Microsoft Remote Desktop Client 安全漏洞 (CVE-2024-38077)
Description:Microsoft Remote Desktop Client是美国微软(Microsoft)公司的一款远程桌面客户端。 Microsoft Remote Desktop Client存在安全漏洞。攻击者利用该漏洞可以远程执行代码。以下产品和版本受到影响:Windows Server 2019,Windows Server 2019 (Server Core installation),Windows Server 2022,Windows Server 2022 (Server Core install
Description
CVE-2024-38077: Remote Code Execution Vulnerability in Windows Remote Desktop Licensing Service
Readme
# CVE-2024-38077
### Here’s a possible GitHub description for CVE-2024-38077:
CVE-2024-38077: Remote Code Execution Vulnerability in Windows Remote Desktop Licensing Service

## Overview:
CVE-2024-38077 is a critical vulnerability in the Windows Remote Desktop Licensing Service, which allows remote attackers to execute arbitrary code on vulnerable systems. This vulnerability is due to a heap overflow in the service when processing specific inputs. Exploiting this flaw could lead to full system compromise, allowing attackers to take control without requiring authentication.

## Affected Systems:
- Windows Server 2016
- Windows Server 2019
- Windows Server 2022
- Windows 10/11 with Remote Desktop Licensing installed
  
## Exploitation:
Attackers can exploit this vulnerability by sending specially crafted messages to the affected service, triggering a heap overflow that leads to remote code execution (RCE). This makes it particularly dangerous, as the attacker could potentially run arbitrary code with system-level privileges.

## Mitigation:
Microsoft has addressed this issue in their latest security patch. Users are strongly encouraged to update their systems immediately to prevent exploitation.

## Proof of Concept (PoC):
This repository includes a PoC that demonstrates how the vulnerability can be triggered. Note: For educational purposes only.
File Snapshot

[4.0K] /data/pocs/d764b2ae8266f52551ec042e7008bda39f6cafae ├── [ 11K] poc.py └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.