Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-0040 PoC — Microsoft Windows 特权提升漏洞

Source
Associated Vulnerability
Title:Microsoft Windows 特权提升漏洞 (CVE-2016-0040)
Description:The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "Windows Elevation of Privilege Vulnerability."
Description
CVE-2016-0040 Privilege Escalation Exploit For WMI Receive Notification Vulnerability (x86-64)
Readme
CVE-2016-0040
This exploit builds upon SMMRootkit's 32Bit project (https://github.com/Rootkitsmm/cve-2016-0040) which causes this vulnerability to trigger a BSoD with all 'a's in RCX and 'B's in RAX.
It was ported to 64Bit Windows 7 SP1 and doesn't use the "mov [rcx+06h], rax" instruction for inital stage exploitation but instead the "mov [rdx+8h], rdx instruction to place a self-referencing pointer into a bitmap's pvScan0 variable".
In order to cleanup from side-effect corruptions the win32k heap 4096 bitmaps were allocated which made the addresses of corruption in the target bitmap predictable so they could be restored. In order to build read/write
primitives Core Security's, "Abusing GDI for Ring0 Exploit Primities" (https://www.coresecurity.com/blog/abusing-gdi-for-ring0-exploit-primitives) was referenced but build out Manager and Worker
bitmaps that could be used to perform system process token stealing.
File Snapshot

[4.0K] /data/pocs/5d9870b40948758aec8942bee048546f6dcc45c6 ├── [4.0K] Application │   ├── [ 249] Application.c │   └── [4.5K] Application.vcxproj ├── [1.1M] Artifacts.zip ├── [2.6K] CVE-2016-0040.sln ├── [4.0K] Library │   ├── [9.2K] Library.c │   ├── [2.0K] Library.h │   └── [3.9K] Library.vcxproj ├── [4.0K] Metasploit │   ├── [ 74K] inject.exe │   ├── [ 451] install.sh │   ├── [ 21K] Metasploit.c │   ├── [7.2K] Metasploit.h │   ├── [5.3K] Metasploit.vcxproj │   ├── [4.3K] module.rb │   └── [ 285] uninstall.sh ├── [ 922] README.md ├── [ 29] requirements.txt ├── [103K] Screenshot.png └── [1.3K] Test.py 3 directories, 18 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →