Win32k 特权提升漏洞
Product | CPU Architecture | Version | Update | Tested |
---|---|---|---|---|
Windows 11 | x64/AMD64 | ✕ | ||
Windows 10 | x86/x64 | |||
Windows 10 | x86/x64 | 1607 | ✔ | |
Windows 10 | x86/x64/AMD64 | 1809 | ✔ | |
Windows 10 | x86/x64/AMD64 | 1909 | ||
Windows 10 | x86/x64/AMD64 | 2004 | ||
Windows 10 | x86/x64/AMD64 | 20H2 | ||
Windows 10 | x86/x64/AMD64 | 21H1 | ||
Windows 7 | x86/x64 | SP1 | ||
Windows 8.1 | x86/x64 | |||
Windows Rt 8.1 | ||||
Windows Server 2008 | x86/x64 | SP2 | ||
Windows Server 2008 | x64 | R2 | SP1 | |
Windows Server 2012 | ||||
Windows Server 2012 | R2 | |||
Windows Server 2016 | ||||
Windows Server 2019 | ||||
Windows Server 2022 | ||||
Windows Server | 2004 | |||
Windows Server | 20H2 |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40449
编译环境
- VS2019(V120)X64 Release(CVE-2021-40449_1607_x64
- VS2019(V142)X64 Release(CallbackHell
推荐使用CallbackHell的代码进行提权
测试系统Windows 10 1607 X64(演示使用的是CVE-2021-40449_1607_x64文件中的代码进行编译