0x00简介
2021年2月10日,微软每月的例行补丁包中修复了一个Windows系统本地提权漏洞,本地攻击者可以利用此漏洞提升到system权限,据称此漏洞被用于定向攻击活动。
0x01漏洞概述
该漏洞由函数win32kfull!xxxCreateWi ndowEx 对应用层回调返回数据校验不严导致,本地用户执行漏洞利用程序获取系统权限。
0x02影响范围
Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server, version 2004 (Server Core installation)
Windows 10 Version 2004 for x64-based Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows Server, version 1909 (Server Core installation)
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1803 for x64-based Systems
0x03环境搭建
1,首先下载我们本次的复现环境的系统,地址:https://msdn.itellyou.cn/
2,然后我们选择windows10的1909版本
3,然后我们在虚拟机里面安装这个windows10的版本,这里安装过程我们省略,可以自行百度
0x04漏洞复现
1,首先我们下载漏洞复现的exp
地址:https://github.com/shanfenglan/test/blob/master/cve-2021-1732.exe
2,创建一个普通用户test
3,然后运行exp
cve-2-21-1732.exe "whoami"
4,可以运行添加一下用户
cve-2021-1732 "net user a a /add"
0x05修复建议
直接更新微软补丁,可通过以下链接获取相关安全补丁:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1732