7.2
CVSSv2

CVE-2019-0808

Published: 09/04/2019 Updated: 09/04/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 726
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Microsoft Windows could allow a local authenticated malicious user to gain elevated privileges on the system, caused by improper handling of objects in memory by the Win32k component. By executing a specially-crafted program, an authenticated attacker could exploit this vulnerability to execute arbitrary code with higher privileges.

Vulnerability Trend

Affected Products

Vendor Product Versions
MicrosoftWindows 7Sp1
MicrosoftWindows Server 2008-, R2

Exploits

# Exploit Title: Microsoft Windows Win32k CVE-2019-0808 Local Privilege Escalation Vulnerability # Date: 24/03/2019 # Exploit Author: ze0r # Vendor Homepage: wwwmicrosoftcom # Version: Microsoft Windows 7/ Server 2008 # CVE : CVE-2019-0808 githubcom/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/46604zip ...

Github Repositories

CVE-2019-0808 packetstormsecuritycom/files/download/152267/cve-2019-0808-poc-mastertgz

cve-2019-0808-poc cve-2019-0808-poc jut BSOD,used for reboot OS;

CVE-2019-5786 and CVE-2019-0808 Chrome 7203626119 stable Windows 7 x86 exploit chain This exploit uses site-isolation to brute-force CVE-2019-5786 host1_wrapper/iframehtml is the wrapper script that loads the exploit repeatedly into an iframe The actual chain resides in the host2_single_run directory The sandbox escape exploit for CVE-2019-0808 is in the file host2_sin

awesome-windows-kernel-security-development pe file format githubcom/corkami/pics meltdown/spectre poc githubcom/turbo/KPTI-PoC-Collection githubcom/gkaindl/meltdown-poc githubcom/feruxmax/meltdown githubcom/Eugnis/spectre-attack lightweight c++ gui library githubcom/idea4good/GuiLite githubcom/golang-ui/nuklea

Awesome CVE PoC A curated list of CVE PoCs Here is a collection about Proof of Concepts of Common Vulnerabilities and Exposures, and you may also want to check out awesome-web-security Please read the contribution guidelines before contributing This repo is full of PoCs for CVEs If you enjoy this awesome list and would like to support it, check out my Patreon page :

Recent Articles

IT threat evolution Q1 2019. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Boris Larin Oleg Kupreev Evgeny Lopatin • 23 May 2019

These statistics are based on detection verdicts of Kaspersky Lab products received from users who consented to provide statistical data.
According to Kaspersky Security Network,
Q1 2019 is remembered mainly for mobile financial threats.
First, the operators of the Russia-targeting Asacub Trojan made several large-scale distribution attempts, reaching up to 13,000 unique users per day. The attacks used active bots to send malicious links to contacts in already infected smartpho...

Microsoft Patch Tuesday – March 2019
Symantec Threat Intelligence Blog • Ratheesh PM • 13 Mar 2019

This month the vendor has patched 64 vulnerabilities, 17 of which are rated Critical.

Posted: 13 Mar, 201920 Min ReadThreat Intelligence SubscribeFollowtwitterfacebooklinkedinMicrosoft Patch Tuesday – March 2019This month the vendor has patched 64 vulnerabilities, 17 of which are rated Critical.As always, customers are advised to follow these security best practices:


Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaining ...

Microsoft changes DHCP to 'Dammit! Hacked! Compromised! Pwned!' Big bunch of security fixes land for Windows
The Register • Shaun Nichols in San Francisco • 12 Mar 2019

DHCP client has trio of remote-code exec vulns – plus SAP, Adobe issue updates

Patch Tuesday It's the second Tuesday of the month, and you know what that means: a fresh dump of security fixes from Microsoft, Adobe and others.
The March edition of Patch Tuesday includes fixes for 64 CVE-listed vulnerabilities, while Adobe addressed a pair of bugs in Photoshop and Digital Editions. Even SAP has got in on the game.
Of the 64 bugs squashed in Redmond's March update, researchers are pointing to five particular bugs as being especially noteworthy.
First, there ...

Microsoft Patches Two Win32k Bugs Under Active Attack
Threatpost • Tom Spring • 12 Mar 2019

Microsoft released patches for two Win32k bugs actively under attack, along with fixes for four additional bugs that are publicly known, as part of its March Patch Tuesday security bulletin. The Win32k bugs are both elevation of privilege vulnerabilities, rated important, and tied to the way Windows handles objects in memory.
“An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete...