7.2
CVSSv2

CVE-2015-1701

Published: 21/04/2015 Updated: 14/05/2020
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 734
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows vista

microsoft windows 2003 server

microsoft windows server 2008 -

microsoft windows 7

Exploits

# Source: githubcom/hfiref0x/CVE-2015-1701 Win32k LPE vulnerability used in APT attack Original info: wwwfireeyecom/blog/threat-research/2015/04/probable_apt28_useohtml Credits R136a1 / hfiref0x ## Compiled EXE: ### x86 + githubcom/hfiref0x/CVE-2015-1701/raw/master/Compiled/Taihou32exe + Exploit-DB Mirror: https: ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' require 'msf/core/post/windows/reflective_dll_injection' require 'rex' class Metasploit3 < Msf::Exploit::Local Rank = NormalRanking include Msf::Post::File include Msf::Post::Windows ...
This Metasploit module exploits improper object handling in the win32ksys kernel mode driver This Metasploit module has been tested on vulnerable builds of Windows 7 x64 and x86, and Windows 2008 R2 SP1 x64 ...
Cellebrite UFED device implements local operating system policies that can be circumvented to obtain a command prompt From there privilege escalation is possible using public exploits Versions 50 through 750845 are affected ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> KL-001-2020-002 : Cellebrite Restricted Desktop Escape and Escalation of User Privilege <!--X-Subject-Header-End--> <! ...

Github Repositories

Win32k LPE vulnerability used in APT attack

CVE-2015-1701 Win32k Elevation of Privilege Vulnerability Original info wwwfireeyecom/blog/threat-research/2015/04/probable_apt28_useohtml Protection Apply MS15-051 for fix technetmicrosoftcom/library/security/MS15-051 Authors (c) 2015 CVE-2015-1701 Project Credits R136a1

Introduction This is my report of CVEs (Common Vulnerabilities and Exposures) while I was in Viettel Cyber Security as an Software Exploitation Intern Detail: This repo include 3 CVEs: CVE-2015-1701: A Win32k LPE vulnerability used in APT attack CVE-2017-5375: JIT code allocation can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attack

Cobalt-Strike-Cheat-Sheet Cobalt Strike Cobalt Strike is threat emulation software Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and evaluate mature security programs Cobalt Strike exploits network vulnerabilities, launches spear phishing campaigns, hosts web drive-by attacks, and generates malware infected files from a powerful grap

Introduction This is my report of CVEs (Common Vulnerabilities and Exposures) while I was in Viettel Cyber Security as an Software Exploitation Intern Detail: This repo include 3 CVEs: CVE-2015-1701: A Win32k LPE vulnerability used in APT attack CVE-2017-5375: JIT code allocation can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attack

windows-exploit-suggester but in python3

wespy3 windows-exploit-suggester but in python3 convert xlsx file to csv to xls As of right now, tool is writing xlsx file, which needs to be converted to csv and then to xls for consumption again by the tool ssconvert filexlsx filecsv ssconvert filecsv filexls Now you can use the script: $ /updated-wes2py --database 2021-10-13-m

Pentest Tips and Tricks Tor Nat Traversal DNS brute forcing with fierce hackersorg/fierce/ $ /fiercepl -dns examplecom $ /fiercepl –dns examplecom –wordlist myWordListtxt Metagoofil metadata gathering tool wwwedge-securitycom/metagoofilphp automate search engine document retrieval and analysis It also has the capability to provide MAC addr

Certified Red Team Operator

CRTO Certified Red Team Operator Course Introduction Command &amp; Control External Reconnaissance Initial Compromise Host Reconnaissance Host Persistence Host Privilege Escalation Domain Reconnaissance Lateral Movement Credentials &amp; User Impersonation Password Cracking Tips &amp; Tricks Session Passing Pivoting Data Protection API Kerberos Active Directory Cer

win-sys 驱动开发工程模板及工具包 src\driver-loader 驱动加载命令行 src\pe2array PE 文件转字节数组并加密,保存为头文件方便其他工程引用 githubcom/eric21/MemPE githubcom/fancycode/MemoryModule githubcom/wyrover/unHooker githubcom/eric21/ssdtRecover21yu3 githubcom/wessamza/R3R-BASE

翻译文章,CVE-2015-0057漏洞在32位和64位系统上的利用。Exploiting the win32k!xxxEnableWndSBArrows use-after-free (CVE 2015-0057) bug on both 32-bit and 64-bit(Aaron Adams of NCC )

CVE-2015-0057漏洞在32位和64位系统上的利用 作者:Aaron Adams 翻译:55-AA 译注:本文部分地方采用了意译,如有疑问请参阅原文。 术语: 操作原语(primitive):类似于一个功能函数,是一系列腐蚀操作的集合,以完成一个完整的可重复利用的功能,如读取内存、写入任意数据等。 代序 今年早

Cobalt-Strike-Cheat-Sheet Cobalt Strike Cobalt Strike is threat emulation software Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and evaluate mature security programs Cobalt Strike exploits network vulnerabilities, launches spear phishing campaigns, hosts web drive-by attacks, and generates malware infected files from a powerful grap

Unspecified vulnerability in Microsoft Windows before 8 allows local users to gain privileges via unknown vectors, as exploited in the wild in April 2015 (Base Score: 7.2 HIGH) Current Description Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a…

CVE-2015-1701 Win32k Elevation of Privilege Vulnerability Original info wwwfireeyecom/blog/threat-research/2015/04/probable_apt28_useohtml Protection Apply MS15-051 for fix technetmicrosoftcom/library/security/MS15-051 #CVE Dictionary Entry: CVE-2015-1701 NVD Published Date: 04/21/2015 NVD Last Modified: 05/14/2020 Source: Microsoft Corporation Follow on:

CRTO Certified Red Team Operator Course Introduction Command &amp; Control External Reconnaissance Initial Compromise Host Reconnaissance Host Persistence Host Privilege Escalation Domain Reconnaissance Lateral Movement Credentials &amp; User Impersonation Password Cracking Tips &amp; Tricks Session Passing Pivoting Data Protection API Kerberos Active Directory Cer

威胁情报,恶意样本分析,开源Malware代码收集

Threat-Intelligence-Analyst 威胁情报,恶意样本分析,自动化python脚本,开源Malware代码收集,APT攻击安例相关 TI威胁情报 startme/p/rxRbpo/ti Analyzing Malicious Password Protected Office Documents r3mrumwordpresscom/2017/06/29/analyzing-malicious-password-protected-office-documents/ Hack githubcom/Hack-with-Github/Awesom

Recent Articles

Guess who's addicted to GitHub, busy on Slack, stuck in 2015? No, not another hipster: It's the Slub backdoor malware
The Register • Shaun Nichols in San Francisco • 08 Mar 2019

Panic, flee, cry – or just update Windows for fsck's sake Psst, hackers. Just go for the known vulnerabilities

A new malware strain tapped into GitHub posts and Slack channels to siphon precious data from infected Windows PCs, it is claimed. Researchers at Trend Micro have dubbed the malware "Slub", a mash-up of the names of the two services the software nasty apparently used to obtain instructions from its masterminds and exfiltrate information from hijacked computers. Trend's virus-hunters said they spotted at the end of last month Slub lurking on a compromised "watering hole," which is a website frequ...

CVE-2015-2545: overview of current threats
Securelist • GReAT • 25 May 2016

CVE-2015-2545 is a vulnerability discovered in 2015 and corrected with Microsoft’s update MS15-099. The vulnerability affects Microsoft Office versions 2007 SP3, 2010 SP2, 2013 SP1 and 2013 RT SP1. The error enables an attacker to execute arbitrary code using a specially crafted EPS image file. The exploit uses PostScript and can evade Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) protection methods. The exploit was discovered in the wild in August 2015, when it...

Kremlin hackers exploited TWO 0-day Flash, Windows vulns
The Register • John Leyden • 20 Apr 2015

Operation RussianDoll smelled like Russian miscreants, say infosec bods

A hacking group probably backed by Russia has been making use of two zero-day exploits to target foreign governments. The so-called "Operation RussianDoll" attackers used zero-day exploits in Adobe Flash and Windows to target a specific foreign government organisation. Security firm FireEye says the pattern of the attacks fits those of the recently exposed APT 28 cyberspies, making the group the most likely culprits for the latest attack. The highly complex attack featuring used two zero-days to...