### [CVE-2019-17603](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17603) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Ene.sys in Asus Aura Sync through 1.07.71 does not properly validate input to IOCTL 0x80102044, 0x80102050, and 0x80102054, which allows local users to cause a denial of service (system crash) or gain privileges via IOCTL requests using crafted kernel addresses that trigger memory corruption. ### POC #### Reference - http://packetstormsecurity.com/files/158221/ASUS-Aura-Sync-1.07.71-Privilege-Escalation.html - http://packetstormsecurity.com/files/158221/ASUS-Aura-Sync-1.07.71-Privilege-Escalation.html - https://zer0-day.pw/2020-06/asus-aura-sync-stack-based-buffer-overflow/ - https://zer0-day.pw/2020-06/asus-aura-sync-stack-based-buffer-overflow/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/dhn/dhn - https://github.com/dhn/exploits