File tree Expand file tree Collapse file tree 1 file changed +6
-3
lines changed
modules/exploits/windows/local Expand file tree Collapse file tree 1 file changed +6
-3
lines changed Original file line number Diff line number Diff line change @@ -18,11 +18,11 @@ class Metasploit3 < Msf::Exploit::Local
18
18
19
19
def initialize ( info = { } )
20
20
super ( update_info ( info , {
21
- 'Name' => 'Windows tcpip.sys Arbitrary Write Privilege Escalation ' ,
21
+ 'Name' => 'Windows tcpip!SetAddrOptions NULL Pointer Dereference ' ,
22
22
'Description' => %q{
23
23
A vulnerability within the Microsoft TCP/IP protocol driver tcpip.sys,
24
- can allow an attacker to inject controlled memory into an arbitrary
25
- location within the kernel .
24
+ can allow an attacker to trigger a NULL pointer dereference by using a
25
+ specially crafted IOCTL .
26
26
} ,
27
27
'License' => MSF_LICENSE ,
28
28
'Author' =>
@@ -51,6 +51,9 @@ def initialize(info={})
51
51
'References' =>
52
52
[
53
53
[ 'CVE' , '2014-4076' ] ,
54
+ [ 'MSB' , 'MS14-070' ] ,
55
+ [ 'OSVDB' , '114532' ] ,
56
+ [ 'URL' , 'https://blog.korelogic.com/blog/2015/01/28/2k3_tcpip_setaddroptions_exploit_dev' ] ,
54
57
[ 'URL' , 'https://www.korelogic.com/Resources/Advisories/KL-001-2015-001.txt' ]
55
58
] ,
56
59
'DisclosureDate' => 'Nov 11 2014' ,
You can’t perform that action at this time.
0 commit comments