POC详情: 1356c8fa4f8f5fa097511c81be42efaf4f4bbdca

来源
关联漏洞
标题: Microsoft Windows Common Log File System Driver 安全漏洞 (CVE-2023-36900)
描述:Microsoft Windows Common Log File System Driver是美国微软(Microsoft)公司的通用日志文件系统 (CLFS) API 提供了一个高性能、通用的日志文件子系统,专用客户端应用程序可以使用该子系统并且多个客户端可以共享以优化日志访问。 Microsoft Windows Common Log File System Driver存在安全漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 10 Version 1809 for 32-
描述
 Denial-of-Service PoC | Writeup | Header with CLFS structures | Imhex pattern for .blf extension
介绍
# CVE-2023-36900
- About this vulnerability: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36900.
- [Writeup](https://github.com/RomanRybachek/CVE-2023-36900/blob/main/writeup/eng/writeup_eng.md)
- [Imhex pattern for .blf extension](#imhex-pattern-for-blf-extension)
- [Header with declaration of CLFS structures](https://github.com/RomanRybachek/CVE-2023-36900/blob/main/clfs_structures.h)
- [Denial-of-Service proof of concept](#denial-of-service-proof-of-concept)
## Imhex pattern for blf extension
### Before:
<img src="https://github.com/RomanRybachek/CVE-2023-36900/blob/main/git_resources/blf_before.png" alt="drawing" width="500"/></br>
### After:
<img src="https://github.com/RomanRybachek/CVE-2023-36900/blob/main/git_resources/blf_after.png" alt="drawing" width="500"/></br></br>
The pattern is far from ideal, but it can be useful. [Link](https://github.com/RomanRybachek/CVE-2023-36900/blob/main/imhex_pattern/blf_clfs.hexpat) </br>
### How to use:
```
File->Import->Pattern File
```
## Denial of Service proof of concept
The proof of concept requres [python](https://www.python.org/downloads/windows/) and the [pwntools](https://github.com/Gallopsled/pwntools) module installed. 
Because testing has to be done on a specific build of Windows, to prevent Microsoft from updating your OS, it must not be connected to the Internet. Therefore, all dependencies need to be installed offline. [How to install python modules without internet](http://srikanthtechnologies.com/blog/python/installing_libraries_offline.aspx).</br>
To run POC, copy [the folder with POC](https://github.com/RomanRybachek/CVE-2023-36900/tree/main/poc) to target machine and use following command:
```
python launch.py DoS
```
文件快照

[4.0K] /data/pocs/1356c8fa4f8f5fa097511c81be42efaf4f4bbdca ├── [4.0K] blf │   ├── [ 32M] can_load_custom_values.blf │   ├── [ 64K] can_put_any_size.blf │   ├── [ 64K] can_reach_patched_func.blf │   ├── [ 64K] can_trigger_vuln.blf │   └── [ 64K] template.blf ├── [6.5K] clfs_structures.h ├── [4.0K] c_sources │   ├── [4.0K] create_log_with_container │   │   ├── [2.9K] create_log_with_container.cpp │   │   ├── [6.5K] create_log_with_container.vcxproj │   │   ├── [ 977] create_log_with_container.vcxproj.filters │   │   └── [ 220] create_log_with_container.vcxproj.user │   ├── [4.0K] create_stream │   │   ├── [2.1K] create_stream.cpp │   │   ├── [6.4K] create_stream.vcxproj │   │   ├── [ 965] create_stream.vcxproj.filters │   │   └── [ 165] create_stream.vcxproj.user │   ├── [2.9K] c_sources.sln │   ├── [4.0K] open_log │   │   ├── [3.5K] open_log.cpp │   │   ├── [6.4K] open_log.vcxproj │   │   ├── [ 960] open_log.vcxproj.filters │   │   └── [ 165] open_log.vcxproj.user │   ├── [4.0K] test │   │   ├── [2.7K] test.cpp │   │   ├── [6.4K] test.vcxproj │   │   ├── [ 956] test.vcxproj.filters │   │   └── [ 165] test.vcxproj.user │   └── [4.0K] test_leak │   ├── [1.5K] test_leak.cpp │   ├── [6.3K] test_leak.vcxproj │   ├── [ 961] test_leak.vcxproj.filters │   └── [ 165] test_leak.vcxproj.user ├── [4.0K] git_resources │   ├── [117K] blf_after.png │   ├── [ 55K] blf_before.png │   ├── [ 96K] ctrl_record_example.png │   ├── [ 67K] path_to_create_dispatch.png │   └── [ 96K] rgBlocks_example.png ├── [4.0K] imhex_pattern │   └── [4.4K] blf_clfs.hexpat ├── [4.0K] poc │   ├── [280K] create_stream.exe │   ├── [2.6K] launch.py │   └── [8.6K] update_crc32.py ├── [1.7K] README.md └── [4.0K] writeup ├── [4.0K] eng │   └── [ 11K] writeup_eng.md ├── [4.0K] resources │   ├── [ 32K] cmp_at_graph.png │   ├── [144K] cmp.png │   ├── [ 25K] graph_before_n_after.png │   ├── [ 26K] little_block_in_decompiler.png │   └── [136K] little_block_in_disasm.png └── [4.0K] ru └── [ 0] writeup_ru.md 14 directories, 44 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。