module
Windows IIS HTTP Protocol Stack DOS
Disclosed | Created |
---|---|
May 11, 2021 | Mar 17, 2022 |
Disclosed
May 11, 2021
Created
Mar 17, 2022
Description
This module exploits CVE-2021-31166, a UAF bug in http.sys
when parsing specially crafted Accept-Encoding headers
that was patched by Microsoft in May 2021, on vulnerable
IIS servers. Successful exploitation will result in
the target computer BSOD'ing before subsequently rebooting.
Note that the target IIS server may or may not come back up,
this depends on the target's settings as to whether IIS
is configured to start on reboot.
when parsing specially crafted Accept-Encoding headers
that was patched by Microsoft in May 2021, on vulnerable
IIS servers. Successful exploitation will result in
the target computer BSOD'ing before subsequently rebooting.
Note that the target IIS server may or may not come back up,
this depends on the target's settings as to whether IIS
is configured to start on reboot.
Authors
Max
Stefan Blair
Axel Souchet
Maurice LAMBERT mauricelambert434@gmail.com
Stefan Blair
Axel Souchet
Maurice LAMBERT mauricelambert434@gmail.com
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.