cve/2021/CVE-2021-36942.md
2024-05-25 21:48:12 +02:00

70 lines
4.3 KiB
Markdown

### [CVE-2021-36942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36942)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20%20Service%20Pack%202&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20Service%20Pack%202%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20Service%20Pack%202&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%20version%202004&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%20version%2020H2&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.14393.4583%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.17763.2114%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.19041.1165%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.19042.1165%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.0.0%3C%206.0.6003.21192%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.0.0%3C%206.1.7601.25685%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.1.0%3C%206.1.7601.25685%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.2.0%3C%206.2.9200.23435%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.3.0%3C%206.3.9600.20094%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Spoofing&color=brighgreen)
### Description
Windows LSA Spoofing Vulnerability
### POC
#### Reference
- https://www.kb.cert.org/vuls/id/405600
#### Github
- https://github.com/0xsyr0/OSCP
- https://github.com/A-Duskin/dockerTesting
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Austin-Src/CVE-Checker
- https://github.com/Kryo1/Pentest_Note
- https://github.com/OriolOriolOriol/ADTech
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Royalboy2000/codeRDPbreaker
- https://github.com/SirElmard/ethical_hacking
- https://github.com/XiaoliChan/PetitPotam-V2
- https://github.com/cfalta/MicrosoftWontFixList
- https://github.com/crisprss/PetitPotam
- https://github.com/csb21jb/Pentesting-Notes
- https://github.com/gecr07/HTB-Academy
- https://github.com/hegusung/netscan
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/kwburns/Efsr-Client
- https://github.com/lawbyte/Windows-and-Active-Directory
- https://github.com/ly4k/PetitPotam
- https://github.com/na245/reu-2023-flask
- https://github.com/oscpname/OSCP_cheat
- https://github.com/r0eXpeR/supplier
- https://github.com/revanmalang/OSCP
- https://github.com/suljov/Windows-and-Active-Directory
- https://github.com/suljov/Windwos-and-Active-Directory
- https://github.com/suljov/suljov-Pentest-ctf-cheat-sheet
- https://github.com/topotam/PetitPotam
- https://github.com/triw0lf/Security-Matters-22
- https://github.com/txuswashere/OSCP
- https://github.com/xhref/OSCP