cve/2017/CVE-2017-0073.md

30 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-0073](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0073)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20GDI%2B&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen)
### Description
The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Windows GDI+ Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0060 and CVE-2017-0062.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/DanielEbert/winafl
- https://github.com/Team-BT5/WinAFL-RDP
- https://github.com/bacon-tomato-spaghetti/WinAFL-RDP
- https://github.com/chaojianhu/winafl-intelpt
- https://github.com/chaojianhu/winafl-intelpt-old
- https://github.com/fox-peach/winafi
- https://github.com/googleprojectzero/winafl
- https://github.com/hardik05/winafl-powermopt
- https://github.com/pranav0408/WinAFL
- https://github.com/s0i37/winafl_inmemory
- https://github.com/ssumachai/CS182-Project
- https://github.com/yrime/WinAflCustomMutate