Skip to content

Latest commit

 

History

History
65 lines (47 loc) · 2.62 KB

README_EN.md

File metadata and controls

65 lines (47 loc) · 2.62 KB

CVE-2020-1054

Describe

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.

ImpactVersion

Product CPU Architecture Version Update Tested
Windows 10 x64/x86/ARM64 1803
Windows 10 x64/x86/ARM64 1909
Windows 10 x64/x86/ARM64 1903
Windows 10 x64/x86 1607
Windows 10 x64/x86/ARM64 1709
Windows 10 x64/x86/ARM64 1809
Windows 10 x64/x86
Windows Server 2019
Windows Server 1803
Windows Server 1909
Windows Server 1903
Windows Server 2016
Windows 8.1 x64/x86
Windows 7 x64/x86 SP1
Windows Server 2012
Windows Server 2012 R2
Windows Server 2008 x64 R2 SP1
Windows Server 2008 x64/x86 SP2
Windows RT 8.1

Patch

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1054

Utilization

CompilerEnvironment

  • cargo 1.51.0 (43b129a20 2021-03-16)

First download cargo, then compile the code

cargo build --release

There are two points here to pay attention:

  • In the analysis article, if your system has patch installed a KB, you need to replace 200 lines of code to 199, and vice versa.
  • The second need to use PowerShell to perform exe,And need to have winlogon.exe This process is running,The location of this process is in the C:\Windows\System32 directory

Then run directly in Windows 7 SP1 X64

CVE-2020-1054

Analyze

ProjectSource