cve/2009/CVE-2009-2532.md

25 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2009-2532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2532)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC do not properly process the command value in an SMB Multi-Protocol Negotiate Request packet, which allows remote attackers to execute arbitrary code via a crafted SMBv2 packet to the Server service, aka "SMBv2 Command Value Vulnerability."
### POC
#### Reference
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-050
#### Github
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
2024-05-27 13:12:02 +00:00
- https://github.com/Cruxer8Mech/Idk
2024-05-26 14:27:05 +02:00
- https://github.com/EricwentwithCyber/Vulnerability-Scan-Lab
- https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits
- https://github.com/uroboros-security/SMB-CVE
- https://github.com/ycdxsb/WindowsPrivilegeEscalation