关联漏洞
标题:
Microsoft Windows WebDAV 特权提升漏洞
(CVE-2016-0051)
描述:Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。WebDAV client是其中的一款Web分布式创作和版本控制客户端。 Microsoft Windows的WebDAV客户端中存在特权提升漏洞,该漏洞源于程序没有正确验证输入。本地攻击者可利用该漏洞使用提升的特权执行任意代码。以下版本受到影响:Microsoft Windows Vista SP2,Windows Server 2008 SP2和R2 SP1,Windows 7 SP1,Windows 8.1,
描述
EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)
介绍
# CVE-2016-0051
Proof-of-concept BSoD (Blue Screen of Death) and Elevation of Privilege (to SYSTEM) code for my CVE-2016-0051 (MS-016).
### EoP to SYSTEM on Windows 7 SP1 x86

### BSoD on a Windows 10 x64

### Links
* [Microsoft Security Bulletin MS16-016](https://technet.microsoft.com/en-us/library/security/ms16-016.aspx)
* [Microsoft Acknowledgements page](https://technet.microsoft.com/library/security/mt674627.aspx)
* [A variant of this PoC where the shell will be spawn in the same CMD](https://github.com/hexx0r/CVE-2016-0051) by hexx0r
### Timeline
* 2015.09.18. Vulnerability found
* 2015.09.24. Reported to MSRC (Microsoft Security Response Center) with this proof-of-concept code
* 2015.09.25. MSRC filed the report, provided point of contact information and sent the info to their analysts
* 2015.09.30. MSRC reproduced the issue, started to investigate whether they will fix it or not
* 2015.10.16. MSRC confirmed that it is exploitable and that they will fix in an upcoming patch release, asked for acknowledgement information
* 2016.02.09. Vulnerability fixed in the 2016 February Patch Tuesday update
* 2016.02.09. BSoD PoC published here
* 2016.02.11. MSRC confirmed to me that they fixed the vulnerability
* 2016.02.15. EoP published here
### Details
TODO
文件快照
[4.0K] /data/pocs/8b37a3c7152497d6b9bc2243fcfc6fcf3b1c6252
├── [4.0K] BSoD
│ ├── [4.0K] BSoD
│ │ ├── [ 182] App.config
│ │ ├── [2.4K] BSoD.csproj
│ │ ├── [4.8K] Program.cs
│ │ └── [4.0K] Properties
│ │ └── [1.4K] AssemblyInfo.cs
│ └── [ 959] BSoD.sln
├── [ 11K] BSoD.exe
├── [1.2M] bsod_win10x64.gif
├── [4.0K] EoP
│ ├── [4.0K] EoP
│ │ ├── [ 151] App.config
│ │ ├── [3.4K] EoP.csproj
│ │ ├── [ 11K] Program.cs
│ │ └── [4.0K] Properties
│ │ └── [1.3K] AssemblyInfo.cs
│ ├── [2.8K] EoP.sln
│ └── [4.0K] Shellcode
│ ├── [3.7K] Shellcode.cpp
│ ├── [7.4K] Shellcode.vcxproj
│ ├── [ 940] Shellcode.vcxproj.filters
│ └── [ 162] Shellcode.vcxproj.user
├── [1.9M] eop_win7x86.gif
├── [8.5K] EoP.zip
└── [1.4K] README.md
7 directories, 19 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。