From 1b220514bb0b58f864fed946ea9b138f16bc52d8 Mon Sep 17 00:00:00 2001 From: Dhiraj Mishra Date: Tue, 18 Sep 2018 19:23:39 +0530 Subject: [PATCH] Updating --- .../post/windows/escalate/ms18_8120_win32k_privsec.rb | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/modules/post/windows/escalate/ms18_8120_win32k_privsec.rb b/modules/post/windows/escalate/ms18_8120_win32k_privsec.rb index 60b20ecc50..36c8d954cf 100644 --- a/modules/post/windows/escalate/ms18_8120_win32k_privsec.rb +++ b/modules/post/windows/escalate/ms18_8120_win32k_privsec.rb @@ -1,16 +1,17 @@ -## This module requires Metasploit: https://metasploit.com/download +## +# This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Post - Rank = GoodRanking + Rank = GoodRanking include Msf::Post::File include Msf::Post::Windows::Registry def initialize(info = {}) super(update_info(info, - 'Name' => 'Win32k Elevation of Privilege Vulnerability', + 'Name' => 'Wink32.sys fails to handle objects in memory (Win32k Elevation of Privilege Vulnerability)', 'Description' => %q{ This module exploits elevation of privilege vulnerability exists in Windows 7 and 2008 R2 when the Win32k component fails to properly handle objects in memory. An attacker who @@ -19,6 +20,7 @@ class MetasploitModule < Msf::Post accounts with full user rights.}, 'References' => [ + ['BID', '104034'], ['CVE', '2018-8120'], ['URL', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8120'], ['URL', 'http://bigric3.blogspot.com/2018/05/cve-2018-8120-analysis-and-exploit.html'], @@ -31,7 +33,7 @@ class MetasploitModule < Msf::Post 'Anton Cherepanov', # Vulnerability discovery 'Dhiraj Mishra ' # Metasploit module ], - 'DisclosureDate' => 'Aug 05 2018', + 'DisclosureDate' => 'May 9 2018', 'Arch' => [ARCH_X64, ARCH_X86], 'SessionTypes' => ['meterpreter'], 'License' => MSF_LICENSE