2022-03-01 16:58:13 +08:00

2.6 KiB
Raw Permalink Blame History

CVE-2020-1054

Describe

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.

ImpactVersion

Product CPU Architecture Version Update Tested
Windows 10 x64/x86/ARM64 1803
Windows 10 x64/x86/ARM64 1909
Windows 10 x64/x86/ARM64 1903
Windows 10 x64/x86 1607
Windows 10 x64/x86/ARM64 1709
Windows 10 x64/x86/ARM64 1809
Windows 10 x64/x86
Windows Server 2019
Windows Server 1803
Windows Server 1909
Windows Server 1903
Windows Server 2016
Windows 8.1 x64/x86
Windows 7 x64/x86 SP1
Windows Server 2012
Windows Server 2012 R2
Windows Server 2008 x64 R2 SP1
Windows Server 2008 x64/x86 SP2
Windows RT 8.1

Patch

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1054

Utilization

CompilerEnvironment

  • cargo 1.51.0 (43b129a20 2021-03-16)

First download cargo, then compile the code

cargo build --release

There are two points here to pay attention:

  • In the analysis article, if your system has patch installed a KB, you need to replace 200 lines of code to 199, and vice versa.
  • The second need to use PowerShell to perform exeAnd need to have winlogon.exe This process is runningThe location of this process is in the C:\Windows\System32 directory

Then run directly in Windows 7 SP1 X64

CVE-2020-1054

Analyze

ProjectSource