35 lines
No EOL
2.4 KiB
Text
35 lines
No EOL
2.4 KiB
Text
////////////////////////////////////////////////////////////////////////////////////
|
|
// +----------------------------------------------------------------------------+ //
|
|
// | | //
|
|
// | ESET, LLC. - http://www.eset.com/ | //
|
|
// | | //
|
|
// | Affected Software: | //
|
|
// | ESET Smart Security <= 3.0.672 | //
|
|
// | | //
|
|
// | Affected Driver: | //
|
|
// | Eset Personal Firewall driver - epfw.sys <= 3.0.672.0 | //
|
|
// | | //
|
|
// | Local Privilege Escalation Exploit | //
|
|
// | For Educational Purposes Only ! | //
|
|
// | | //
|
|
// +----------------------------------------------------------------------------+ //
|
|
// | | //
|
|
// | NT Internals - http://www.ntinternals.org/ | //
|
|
// | alex ntinternals org | //
|
|
// | 18 December 2008 | //
|
|
// | | //
|
|
// | References: | //
|
|
// | Exploiting Common Flaws in Drivers | //
|
|
// | Ruben Santamarta - http://reversemode.com/ | //
|
|
// | | //
|
|
// +----------------------------------------------------------------------------+ //
|
|
////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
Exploit:
|
|
http://www.ntinternals.org/ntiadv0807/Epfw_Exp.zip
|
|
backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7516.zip (2008-Epfw_Exp.zip)
|
|
|
|
Advisory:
|
|
http://www.ntinternals.org/ntiadv0807/ntiadv0807.html
|
|
|
|
# milw0rm.com [2008-12-18] |