module
Microsoft Windows POP/MOV SS Local Privilege Elevation Vulnerability
Disclosed | Created |
---|---|
2018-05-08 | 2018-07-25 |
Disclosed
2018-05-08
Created
2018-07-25
Description
This module exploits a vulnerability in a statement in the system programming guide
of the Intel 64 and IA-32 architectures software developer's manual being mishandled
in various operating system kerneles, resulting in unexpected behavior for #DB
excpetions that are deferred by MOV SS or POP SS.
This module will upload the pre-compiled exploit and use it to execute the final
payload in order to gain remote code execution.
of the Intel 64 and IA-32 architectures software developer's manual being mishandled
in various operating system kerneles, resulting in unexpected behavior for #DB
excpetions that are deferred by MOV SS or POP SS.
This module will upload the pre-compiled exploit and use it to execute the final
payload in order to gain remote code execution.
Authors
Nick Peterson
Nemanja Mulasmajic
Can Bölük can1357
bwatters-r7
Nemanja Mulasmajic
Can Bölük can1357
bwatters-r7
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.