关联漏洞
标题:
Microsoft Windows COM 权限许可和访问控制问题漏洞
(CVE-2017-0213)
描述:Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。Windows COM Aggregate Marshaler是其中的一个组件。 Microsoft Windows中的Windows COM Aggregate Marshaler存在提权漏洞。本地攻击者可通过运行特制的应用程序利用该漏洞在应用程序上下文中执行任意任意代码。以下版本受到影响:Microsoft Windows Server 2008 SP2和R2 SP1;Windows 7 SP1;Windows
描述
Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.
介绍
# CVE-2017-0213: Windows COM Elevation of Privilege Vulnerability
## Description
**Author:** Google Security Research
**CVE:** 2017-0213
**EDB-ID:** 42020
**References:** [Project-Zero](https://bugs.chromium.org/p/project-zero/issues/detail?id=1107) [Microsoft](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0213) [Exploit-Database](https://www.exploit-db.com/exploits/42020/)
**Video:** [Youtube](https://youtu.be/6naFH9MQHy8)
## Affected Products
| Product | Version | Update | Build | Tested |
| :------------------ | :------ | :----- | :---- | :----- |
| Windows 10 | 1511 | | 10586 | √ |
| Windows 10 | 1607 | | 14393 | √ |
| Windows 10 | 1703 | | 15063 | √ |
| Windows 7 | | SP1 | | √ |
| Windows 8.1 | | | | |
| Windows RT 8.1 | | | | |
| Windows Server 2008 | | SP2 | | |
| Windows Server 2008 | R2 | SP1 | | |
| Windows Server 2012 | | | | |
| Windows Server 2012 | R2 | | | |
| Windows Server 2016 | | | | |
## Exploits
**x86 Exe:** [Download](https://github.com/Rylie7021/CVE-2017-0213/blob/master/CVE-2017-0213_x86.exe)
SHA256: 67824ca4b91897a8b2cb5cea916fa0ded010355f57110c2c50e9787324199949
**x64 Exe:** [Download](https://github.com/Rylie7021/CVE-2017-0213/blob/master/CVE-2017-0213_x64.exe)
SHA256: 64f8c52433718c83a7818b1c22c6d60bcc06d0a72b6582f7e5da5f02acfa8987
**x86 Zip:** [Download](https://github.com/WindowsExploits/Exploits/raw/master/CVE-2017-0213/Binaries/CVE-2017-0213_x86.zip)
SHA256: 67824ca4b91897a8b2cb5cea916fa0ded010355f57110c2c50e9787324199949
**x64 Zip:** [Download](https://github.com/WindowsExploits/Exploits/raw/master/CVE-2017-0213/Binaries/CVE-2017-0213_x64.zip)
SHA256: 64f8c52433718c83a7818b1c22c6d60bcc06d0a72b6582f7e5da5f02acfa8987
文件快照
[4.0K] /data/pocs/763754ba6bb855ee445b8f167f9304e1b57c7ac3
├── [201K] CVE-2017-0213_x64 Antivirus Bypassed.rar
├── [157K] CVE-2017-0213_x64.exe
├── [132K] CVE-2017-0213_x86.exe
└── [2.0K] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。