Skip to content

Commit

Permalink
Readme.md
Browse files Browse the repository at this point in the history
  • Loading branch information
WindowsExploits authored Jun 11, 2017
1 parent eb3845b commit 1ad7912
Showing 1 changed file with 37 additions and 0 deletions.
37 changes: 37 additions & 0 deletions CVE-2016-3309/Readme.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
# CVE-2016-3309: Microsoft Windows Kernel 'Win32k.sys' Local Privilege Escalation Vulnerability

## Description

**Author:** SensePost

**CVE:** CVE-2016-3309

**EDB-ID:**

**Microsoft Security Bulletin:** MS16-098

**References:** [Sensepost](https://sensepost.com/blog/2017/exploiting-ms16-098-rgnobj-integer-overflow-on-windows-8.1-x64-bit-by-abusing-gdi-objects/) [Sensepost](https://github.com/sensepost/ms16-098) [Microsoft](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-3309)

**Video:** [Youtube](https://youtu.be/_KPf311WNgc)


## Affected Products

| Product | Version | Update | Build | Tested |
| :---------------------- | :------ | :----- | :---- | ------ |
| Windows 10 x64 | 1511 | | | |
| Windows 10 x64 | 1607 | | | |
| Windows 8.1 x64 | | | ||
| Windows 7 x64 | | SP1 | | |
| Windows Vista | | | | |
| Windows Server 2008 x64 | | SP2 | | |
| Windows Server 2008 x64 | R2 | SP1 | | |
| Windows Server 2012 x64 | | | | |
| Windows Server 2012 x64 | R2 | | | |

## Exploits


**x64:** [Download](https://github.com/WindowsExploits/Exploits/raw/master/CVE-2016-3309/Binaries/bfill.exe)

SHA256: 3c32c24c985455f1d4128a24ebc59ec7eb3158bfc9f2b81178a80f07d1ce0a1e

0 comments on commit 1ad7912

Please sign in to comment.