module

Microsoft Windows DrawIconEx OOB Write Local Privilege Elevation

Disclosed
Feb 20, 2020
Created
Dec 15, 2020

Description

This module exploits CVE-2020-1054, an out of bounds write reachable from DrawIconEx
within win32k. The out of bounds write can be used to overwrite the pvbits of a
SURFOBJ. By utilizing this vulnerability to execute controlled writes to kernel
memory, an attacker can gain arbitrary code execution as the SYSTEM user.

This module has been tested against a fully updated Windows 7 x64 SP1. Offsets
within the exploit code may need to be adjusted to work with other versions of
Windows.

Authors

Netanel Ben-Simon
Yoav Alon
bee13oy
timwr

Platform

Windows

Architectures

x64

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/local/cve_2020_1054_drawiconex_lpe
msf exploit(cve_2020_1054_drawiconex_lpe) > show targets
...targets...
msf exploit(cve_2020_1054_drawiconex_lpe) > set TARGET < target-id >
msf exploit(cve_2020_1054_drawiconex_lpe) > show options
...show and set options...
msf exploit(cve_2020_1054_drawiconex_lpe) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.