• Close
  • Back to search

    MQAC.sys Arbitrary Write Privilege Escalation

    A vulnerability within the MQAC.sys module allows an attacker to overwrite an arbitrary location in kernel memory. This module will elevate itself to SYSTEM, then inject the payload into another SYSTEM process.

    Free Metasploit Download

    Get your copy of the world's leading penetration testing tool

     Download Now

    Module Name

    exploit/windows/local/mqac_write

    Authors

    • Matt Bergin
    • Spencer McIntyre

    References

    Targets

    • Windows XP SP3

    Platforms

    • windows

    Architectures

    • x86

    Reliability

    Development

    Module Options

    To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

    msf > use exploit/windows/local/mqac_write msf exploit(mqac_write) > show targets ...targets... msf exploit(mqac_write) > set TARGET <target-id> msf exploit(mqac_write) > show options ...show and set options... msf exploit(mqac_write) > exploit

    Related Vulnerabilities

    Related Modules