影响范围
Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server, version 2004 (Server Core installation)
Windows 10 Version 2004 for x64-based Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows Server, version 1909 (Server Core installation)
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1803 for x64-based Systems
漏洞类型
本地权限提升
利用条件
影响范围应用
漏洞概述
2021年2月10日,微软例行补丁包中修复了一个Windows系统本地提权漏洞,本地攻击者可以利用此漏洞提升到system权限,据称造成该漏洞的主要原因是Windows 图形驱动win32kfull!NtUserCreateWindowEx函数中的一处内核回调用户态分配内存与tagWND->flag属性设置不同步所致,使得可以通过伪造tagWND->offset值发生内存越界。
漏洞复现
环境搭建
前往\\”MSDN我告诉你\\”(https://msdn.itellyou.cn/)下载Windows 10 1909 x64位操作系统:
之后通过虚拟机安装Windows 10 1909系统镜像来搭建Windows 10漏洞复现环境,查看版本信息如下:
查看当前用户权限如下:
漏洞利用
下载漏洞EXP:
https://github.com/KaLendsi/CVE-2021-1732-Exploit
之后编译EXP:
在Windows 10上执行EXP后成功提权之system权限:
安全建议
官方已发布更新补丁包,在影响范围的系统可以打补丁进行修复:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1732
参考链接
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1732
https://msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1732
https://bbs.pediy.com/thread-266362.htm
原创文章,作者:七芒星实验室,如若转载,请注明出处:https://www.sudun.com/ask/34223.html