Giter Club home page Giter Club logo

cve-2019-0708's Introduction

Leaving for a wedding tomorrow, if I can't find anything then someone else take the reins

Going to drop the crash PoC here Friday if there isnt one public already... Maybe the following week, depending on if the vulnerable numbers drop consistently or not.

https://vimeo.com/339425966

I'm not responsible for what you use this to accomplish and should only be used for education purposes
didn't port the socket to talk to server 2003 and win xp but should be straight forward if you wanted (Add security exchange PDU and do the math)

cve-2019-0708's People

Contributors

n1xbyte avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

cve-2019-0708's Issues

nice work bro.

This is only one POC which trigger the corrupt memory.
For other POC, most of them didnt even finish sending "font list pdu", and they call it a crash POC or a part of working exploit?

Nice work bro, I guess it needs more bytes in Virtual Channel PDU to cover more memory.

You're king

"Going to drop the crash PoC here Friday if there isnt one public already... Maybe the following week, depending on if the vulnerable numbers drop consistently or not.

Crash PoC on all affected platforms 32/64"

It's actually really hilarious that people nowadays doesn't even understand why you put multiple \x41 (AAAAAAAAAAAAAAAAAAA...) in a heap, lol. BTW: The thing with you did with the channum and the multiplication for the padding to make sure that the stack pointer lands on that free after use heap is absolutely genius, congratulations.

No worries, I'll not release anything but don't you think it's way more funny to see that the biggest part of the people don't have any idea about how a stack pointer works?

3rd parameter of the IcaBindChannel function.

Hi,
your codes is hitting the vulnerable path of termdd.sys, but the 3rd parameter of the IcaBindChannel function seems to be fixed at int64(3) or int64(4) while running your codes.
pic
According to the public informations, the 3rd parameter should be controlled if we want to exploit this bug.
Any idea?

Need help to ensure nothing else happens

I am new to Python. I reviewed the code and everything looked like it would be fine to run. I was testing against a machine I thought was vulnerable still on my network but I wasn't seeing anything happen. I got frustrated and started hitting a range on my network. Our IT help desk started getting calls from users that their computers were blue screening. I stopped the script from running but it made it to several subnets and unknown how many machines.

Can someone please help verify that there was no malware sent with the commands? I think it was only causing the blue screen issue and nothing else.

MS12-020

patched windows server 2008 r2
kbKB2667402
then run crashexploit.py

the host is ok
so
this fake poc!!! is NOT CVE-2019-0708 POC

I am probably doing something wrong

This is what I get when I run it on a vulnerable system

Traceback (most recent call last): File "crashpoc.py", line 194, in <module> main(sys.argv) File "crashpoc.py", line 158, in main tls = send_init_packets(args[1]) File "crashpoc.py", line 71, in send_init_packets tls.do_handshake() File "/usr/lib/python2.7/dist-packages/OpenSSL/SSL.py", line 1915, in do_handshake self._raise_ssl_error(self._ssl, result) File "/usr/lib/python2.7/dist-packages/OpenSSL/SSL.py", line 1639, in _raise_ssl_error raise SysCallError(errno, errorcode.get(errno)) OpenSSL.SSL.SysCallError: (104, 'ECONNRESET')

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.