7.8
CVSSv3

CVE-2018-1038

Published: 02/04/2018 Updated: 03/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 727
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Windows kernel in Windows 7 SP1 and Windows Server 2008 R2 SP1 allows an elevation of privilege vulnerability due to the way it handles objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 7 -

microsoft windows server 2008 r2

Exploits

#include "stdafxh" #define PML4_BASE 0xFFFFF6FB7DBED000 #define PDP_BASE 0xFFFFF6FB7DA00000 #define PD_BASE 0xFFFFF6FB40000000 #define PT_BASE 0xFFFFF68000000000 typedef LARGE_INTEGER PHYSICAL_ADDRESS, *PPHYSICAL_ADDRESS; #pragma pack(push,4) typedef struct _CM_PARTIAL_RESOURCE_DESCRIPTOR { UCHAR Type; UCHAR ShareDisposition; USHORT Flags; ...

Github Repositories

PCILeech Summary: PCILeech uses PCIe hardware devices to read and write target system memory This is achieved by using DMA over PCIe No drivers are needed on the target system PCILeech also works without hardware together with a wide range of software memory acqusition methods supported by the LeechCore library - including capture of remote live memory using DumpIt or WinPme

Direct Memory Access (DMA) Attack Software

PCILeech Summary: PCILeech uses PCIe hardware devices to read and write target system memory This is achieved by using DMA over PCIe No drivers are needed on the target system PCILeech also works without hardware together with a wide range of software memory acqusition methods supported by the LeechCore library - including capture of remote live memory using DumpIt or WinPme

https://github.com/ufrisk/pcileech

PCILeech Summary: PCILeech uses PCIe hardware devices to read and write target system memory This is achieved by using DMA over PCIe No drivers are needed on the target system PCILeech also works without hardware together with a wide range of software memory acqusition methods supported by the LeechCore library - including capture of remote live memory using DumpIt or WinPme

LeechCore - Physical Memory Acquisition Library & The LeechAgent Remote Memory Acquisition Agent

The LeechCore Physical Memory Acquisition Library: The LeechCore Memory Acquisition Library focuses on Physical Memory Acquisition using various hardware and software based methods LeechCore provides API-based access to various hardware and software based memory sources via its C/C++, Python and C# APIs Download the latest release of the library here on Github If using Pytho

《关于编写 x64 Windows 10 驱动以了解虚拟内存这件事》系列视频附带的代码和材料

video-virtual-memory-materials 《关于编写 x64 Windows 10 驱动以了解虚拟内存这件事》系列视频附带的代码和材料。 © 杜龙实验室。保留所有权利。 软件、文档版权归原作者所有,提供链接仅为方便下载,如有侵权请立即与我们联系,我们将及时处理。 01 简介 视频 bilibili YouTube 材料 PPT

PCILeech Summary: PCILeech uses PCIe hardware devices to read and write target system memory This is achieved by using DMA over PCIe No drivers are needed on the target system PCILeech also works without hardware together with a wide range of software memory acqusition methods supported by the LeechCore library - including capture of remote live memory using DumpIt or WinPme

video-virtual-memory-materials 《关于编写 x64 Windows 10 驱动以了解虚拟内存这件事》系列视频附带的代码和材料。 © 杜龙实验室。保留所有权利。 软件、文档版权归原作者所有,提供链接仅为方便下载,如有侵权请立即与我们联系,我们将及时处理。 01 简介 视频 bilibili YouTube 材料 PPT

Recent Articles

Mad March Meltdown! Microsoft's patch for a patch for a patch may need another patch
The Register • Shaun Nichols in San Francisco • 03 Apr 2018

If at first, er, second, ah, third, no, fourth, you fail, sadly, you're probably Redmond

Updated Days after Microsoft released its third attempt at a fix for the Meltdown security vulnerability in Intel's modern processors, system administrators say many of their 64-bit Windows 7 and Server 2008 R2 boxes are still unable to be properly patched. Pseudo-anonymous Reg reader Lawrence Birdman, who administers around 120 Windows 7 x64 PCs, says all but four of his machines haven't been able to get the most recent update – the software tweak appearing as "not applicable" for the compute...

Microsoft patches patch for Meltdown bug patch: Windows 7, Server 2008 rushed an emergency fix
The Register • Shaun Nichols in San Francisco • 29 Mar 2018

If at first you don't succeed, you're Redmond

Microsoft today issued an emergency security update to correct a security update it issued earlier this month to correct a security update it issued in January and February. In January and February, Redmond emitted fixes for Windows 7 and Server 2008 R2 machines to counter the Meltdown chip-level vulnerability in modern Intel x64 processors. Unfortunately, those patches blew a gaping hole in the operating systems: normal applications and logged-in users could now access and modify any part of ph...