win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
Product | CPU Architecture | Version | Update | Tested |
---|---|---|---|---|
Windows 7 | SP1 | ✔ | ||
Windows 8 | ||||
Windows 8.1 | ||||
Windows Rt | ||||
Windows Rt 8.1 | ||||
Windows Server 2003 | SP2 | |||
Windows Server 2008 | SP2 | |||
Windows Server 2008 | R2 | SP1 | ✔ | |
Windows Server 2012 | ||||
Windows Server 2012 | R2 | |||
Windows Vista | SP2 |
There are currently two source code
- CVE-2015-0057_win8.1Source code for Windows 8.1 below the folder, feasibility is not tested
- exploit-dbDownload the source code did not test
The test uses the compiled EXP CVE-2015-0057_x86
and CVE-2015-0057_x64
found on the web,可With the success of Windows7 / 2008, it will add user accounts k8team$
passwd K8TeAm520!@#
Test Windows 7 SP1 X86