Only Hitting PoC [Tested on Windows Server 2008 r2]
<h2 align="center">CVE-2019-0708</h2>
<h3 align="center">The Crashing Part [BSOD] has been removed intentionally!</h3>
<p align="center">
<img src="sc.JPG" />
</p>
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker
connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user
interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could
then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP.
The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
#### References:
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rdpbcgr
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
- https://github.com/FreeRDP/FreeRDP
- https://github.com/citronneur/rdpy
- https://github.com/rdesktop/rdesktop
- https://github.com/SecureAuthCorp/impacket/
### Usage
``` usage: python3 poc.py -f ips.txt ```
## Contribution, Credits & License
### Ways to contribute
* Suggest a feature
* Report a bug
* Fixing Issues
Licensed under the GNU GPLv3, see LICENSE for more information.
[4.0K] /data/pocs/e9507049d3466517698fbddd560a776e2d28a25f
├── [ 28K] 0708.py
├── [1.5K] README.md
└── [201K] sc.JPG
0 directories, 3 files