关联漏洞
标题:
Microsoft Windows TCP/IP component 数字错误漏洞
(CVE-2024-38063)
描述:Microsoft Windows tcp/ip是美国微软(Microsoft)公司的一个 Windows 的 Tcp/Ip 支持服务。 Microsoft Windows TCP/IP component存在数字错误漏洞。攻击者利用该漏洞可以远程执行代码。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 f
介绍
# CVE-2024-38063
## Description
This repository contains details and potential exploit code for CVE-2024-38063, a critical Windows TCP/IP Remote Code Execution (RCE) vulnerability. The vulnerability allows an unauthenticated attacker to execute arbitrary code on the target system through specially crafted TCP/IP packets.
This vulnerability affects the Windows TCP/IP stack and could allow remote attackers to take full control of affected systems without any user interaction or authentication.
## Metrics
### CVSS 3.x Severity and Vector Strings:
- **CNA**: Microsoft Corporation
- **Base Score**: 9.8 (CRITICAL)
- **Vector**: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
The CVSS score represents the severity of the vulnerability:
- **Attack Vector (AV)**: Network (N) - The vulnerability is exploitable remotely.
- **Attack Complexity (AC)**: Low (L) - The attack is straightforward with no special conditions required.
- **Privileges Required (PR)**: None (N) - The attacker does not require any privileges to exploit the vulnerability.
- **User Interaction (UI)**: None (N) - No user interaction is needed for exploitation.
- **Scope (S)**: Unchanged (U) - The exploit does not affect resources beyond the vulnerable component.
- **Confidentiality (C)**: High (H) - Full access to confidential information can be gained.
- **Integrity (I)**: High (H) - Complete control over system integrity.
- **Availability (A)**: High (H) - Complete disruption of the system's availability.
### NIST CVSS Score vs. CNA Score:
The NIST CVSS score for this vulnerability may differ from the CNA score provided by Microsoft, so always refer to both sources for a complete understanding of the severity.
## Exploit Code
This repository includes the exploit code for CVE-2024-38063. This code is intended for educational and research purposes only. Unauthorized use of this code in a live environment is illegal and unethical.
## Reference
For more detailed information and to access the code, visit the [GitHub Repository](https://github.com/ynwarcs/CVE-2024-38063?tab=readme-ov-file).
文件快照
[4.0K] /data/pocs/d1dfe18334639da571a3279e21e4e018ba6ddbf6
├── [2.8K] Cve-2024-37063-poc.py
├── [1.7K] Cve-2024-38063-rce.py
├── [2.2K] Cve-rce2.py
└── [2.0K] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。