exploit-db-mirror/platforms/windows/dos/38793.txt
Offensive Security daf16b0803 DB: 2015-11-24
16 new exploits
2015-11-24 05:03:23 +00:00

8 lines
469 B
Text
Executable file

Source: https://code.google.com/p/google-security-research/issues/detail?id=516
The attached testcase crashes Windows 7 32-bit due to a pool buffer overflow in an ioctl handler. Enabling special on ndis.sys netio.sys and ntoskrnl helps to track down the issue, however it will crashes due to a bad pool header without special pool as well.
---
Proof of Concept:
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/38793.zip