Exploit Microsoft Windows - 'ndis.sys' IOCTL 0x170034 (ndis!ndisNsiGetIfNameForIfIndex) Pool Buffer Overflow (MS15-117)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
38793
Проверка EDB
  1. Пройдено
Автор
NILS SOMMER
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-2015-6098
Дата публикации
2015-11-23
Microsoft Windows - 'ndis.sys' IOCTL 0x170034 (ndis!ndisNsiGetIfNameForIfIndex) Pool Buffer Overflow (MS15-117)
Код:
Source: https://code.google.com/p/google-security-research/issues/detail?id=516

The attached testcase crashes Windows 7 32-bit due to a pool buffer overflow in an ioctl handler. Enabling special on ndis.sys netio.sys and ntoskrnl helps to track down the issue, however it will crashes due to a bad pool header without special pool as well.
---

Proof of Concept:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38793.zip
 
Источник
www.exploit-db.com

Похожие темы