Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-0796 PoC — 微软 Microsoft SMBv3 缓冲区错误漏洞

Source
Associated Vulnerability
Title:微软 Microsoft SMBv3 缓冲区错误漏洞 (CVE-2020-0796)
Description:A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.
Readme
# CVE-2020-0796 
**정수 오버플로우 취약점**

**OriginalCompressedSegmentSize 필드에 저장 가능한 값보다 큰 값을 넣어. 변수가 이 값을 감당할 수 없어 의도치 않게 매우 작은 수로 인식하거나, 음수 값
으로 인식하게 된다. 이 때 프로그램이 예상 밖의 동작을 하게 될 수 있는데 이것이 블루스크린
이나 권한 상승 같은 것이 될 수 있다.**
**쉽게 말해 일부러 어떤 변수에 감당할 수 있는 값보다 큰 값을 넣어준다는 것.**

# 시연 영상


https://github.com/user-attachments/assets/2b897cfd-6009-4de8-9638-8a9bace6ec7e



# 참고
**https://www.kdu.ac.kr/ins/board/download.do?mncd=1159&fno=29415&bid=00000482&did=00048749**
**https://github.com/jiansiting/CVE-2020-0796/blob/master/cve-2020-0796.py**
**https://www.dailysecu.com/news/articleView.html?idxno=109920**



File Snapshot

[4.0K] /data/pocs/8ea7c4a6db6fea2e510645f944ff1eb24f6e1d3c ├── [5.9K] main.py └── [ 889] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →