menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right Windows本地提权漏洞 chevron_right (CVE-2020-0796)Windows 本地提权漏洞.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    (CVE-2020-0796)Windows 本地提权漏洞.md
    1.82 KB / 2021-04-21 09:23:46
        # CVE-2020-0796
    
    #### 描述
    
    该漏洞无需授权验证即可被远程利用,可能形成蠕虫级漏洞。目前利用方式是提权
    
    #### 影响版本
    
    ```
    Windows 10 Version 1903 for 32-bit Systems
    Windows 10 Version 1903 for x64-based Systems
    Windows 10 Version 1903 for ARM64-based Systems
    Windows Server, version 1903 (Server Core installation)
    Windows 10 Version 1909 for 32-bit Systems
    Windows 10 Version 1909 for x64-based Systems
    Windows 10 Version 1909 for ARM64-based Systems
    Windows Server, version 1909 (Server Core installation)
    只影响 SMB v3.1.1,1903和1909
    ```
    
    #### 修复补丁
    
    ```
    https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796
    ```
    
    #### 利用方式
    
    这个有点鸡肋特定的windows10 才行还有一个Windows Server 2016
    
    编译方式
    
    - VS2019(V142)X64 Debug
    
    编译好的文件位置
    
    ```
    https://github.com/Ascotbe/WindowsKernelExploits/blob/master/CVE-2020-0796/cve-2020-0796-local.exe
    ```
    
    环境下载,这边用的是windows 10 Version 1903
    
    ```
    ed2k://|file|cn_windows_10_business_editions_version_1903_x64_dvd_e001dd2c.iso|4815527936|47D4C57E638DF8BF74C59261E2CE702D|/
    ```
    
    查看MD5值
    
    ```
    Get-FileHash -Path c:/windows/system32/drivers/srv2.sys
    ```
    
    [![image-20200810115258497](resource/%EF%BC%88CVE-2020-0796%EF%BC%89Windows%20%E6%9C%AC%E5%9C%B0%E6%8F%90%E6%9D%83%E6%BC%8F%E6%B4%9E/media/5.png)](https://github.com/Ascotbe/Random-img/blob/master/WindowsKernelExploits/5.png?raw=true)
    
    然后就直接上GIF图了
    
    [![1](resource/%EF%BC%88CVE-2020-0796%EF%BC%89Windows%20%E6%9C%AC%E5%9C%B0%E6%8F%90%E6%9D%83%E6%BC%8F%E6%B4%9E/media/6.gif)](https://github.com/Ascotbe/Random-img/blob/master/WindowsKernelExploits/6.gif?raw=true)
    
    #### 项目来源
    
    - [@danigargu](https://github.com/danigargu/CVE-2020-0796)
    
    > https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2020-0796
    
    links
    file_download