POC详情: e9507049d3466517698fbddd560a776e2d28a25f

来源
关联漏洞
标题: Microsoft Remote Desktop Services 资源管理错误漏洞 (CVE-2019-0708)
描述:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。Remote Desktop Services是其中的一个远程桌面服务组件。 Microsoft Remote Desktop Services中存在资源管理错误漏洞。该漏洞源于网络系统或产品对系统资源(如内存、磁盘空间、文件等)的管理不当。以下
描述
Only Hitting PoC [Tested on Windows Server 2008 r2]
介绍

<h2 align="center">CVE-2019-0708</h2>
<h3 align="center">The Crashing Part [BSOD] has been removed intentionally!</h3>

 <p align="center">
<img src="sc.JPG"  />
</p>

A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker
connects to the target system using RDP and sends specially crafted requests.  This vulnerability  is pre-authentication  and  requires  no user
interaction.  An attacker who  successfully  exploited this  vulnerability could execute arbitrary code on the  target system. An attacker could
then  install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would  need to send a specially  crafted request to the target systems Remote Desktop Service via RDP.
The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.

#### References:
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rdpbcgr
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
- https://github.com/FreeRDP/FreeRDP
- https://github.com/citronneur/rdpy
- https://github.com/rdesktop/rdesktop
- https://github.com/SecureAuthCorp/impacket/

### Usage
``` usage: python3 poc.py -f ips.txt ```


## Contribution, Credits & License
### Ways to contribute

* Suggest a feature
* Report a bug
* Fixing Issues

Licensed under the GNU GPLv3, see LICENSE for more information.
文件快照

[4.0K] /data/pocs/e9507049d3466517698fbddd560a776e2d28a25f ├── [ 28K] 0708.py ├── [1.5K] README.md └── [201K] sc.JPG 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。