metasploit-framework/external/source/exploits/CVE-2019-1458
Tim W 12c5f4f916
CVE-2019-1458 chrome sandbox escape initial commit
2020-10-15 10:57:46 -05:00
..
CVE-2019-1458.sln CVE-2019-1458 chrome sandbox escape initial commit 2020-10-15 10:57:46 -05:00
CVE-2019-1458.vcxproj CVE-2019-1458 chrome sandbox escape initial commit 2020-10-15 10:57:46 -05:00
LICENSE CVE-2019-1458 chrome sandbox escape initial commit 2020-10-15 10:57:46 -05:00
Makefile CVE-2019-1458 chrome sandbox escape initial commit 2020-10-15 10:57:46 -05:00
README.md CVE-2019-1458 chrome sandbox escape initial commit 2020-10-15 10:57:46 -05:00
dllmain.cpp CVE-2019-1458 chrome sandbox escape initial commit 2020-10-15 10:57:46 -05:00
exploit.cpp CVE-2019-1458 chrome sandbox escape initial commit 2020-10-15 10:57:46 -05:00
shellcode.asm CVE-2019-1458 chrome sandbox escape initial commit 2020-10-15 10:57:46 -05:00

README.md

CVE-2019-1458 Windows LPE Exploit

Caution

  • YOU ONLY HAVE ONE CHANCE TO EXPLOIT FOR EACH KERNEL REBOOT!!!!

Screenshot

exploit

Supported Version

  • Windows 2012 R2 (Tested)
  • Windows 8 (Tested)
  • Windows 2008 R2 x64(Tested)
  • Windows 7.1 x64 (Tested)
  • Windows 7 x64
  • Windows 2012 x64
  • Windows 2008 x64
  • ALL X32 VERSION SYSTEMS ARE NOT SUPPORTED (Who uses x32 system nowadays?)

Issues

  • Kernel might crash when rebooting system after exploit

Reference