Skip to content

Files

Latest commit

May 12, 2017
5df8084 · May 12, 2017

History

History
This branch is 168 commits behind SecWiki/windows-kernel-exploits:master.

MS11-062

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
May 12, 2017
Apr 22, 2017
Apr 22, 2017
Apr 22, 2017
Apr 22, 2017
Apr 22, 2017

MS11-062

An elevation of privilege vulnerability exists in the NDISTAPI.sys component of the
Remote Access Service NDISTAPI driver.The vulnerability is caused when the NDISTAPI 
driver improperly validates user-supplied input when passing data from user mode
to the Windows kernel. An attacker must have valid logon credentials and be able
to log on locally to exploit the vulnerability. An attacker who successfully 
exploited this vulnerability could run arbitrary code in kernel mode (i.e. with NT AUTHORITY\SYSTEM  privileges)

Vulnerability reference:

Usage

If Admin have enable the routing and remote access service start_service

c:\> MS11-62.exe

win2003