Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2008-4250

Description

The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka "Server Service Vulnerability."

POC

Reference

- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067

- https://www.exploit-db.com/exploits/6824

- https://www.exploit-db.com/exploits/6841

- https://www.exploit-db.com/exploits/7104

- https://www.exploit-db.com/exploits/7132

Github

- https://github.com/0xwh1pl4sh/MS08-067

- https://github.com/4070E034/gank

- https://github.com/4070E071/nmap

- https://github.com/4n0nym0u5dk/MS08_067_CVE-2008-4250

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/Al1ex/WindowsElevation

- https://github.com/AnshumanSrivastavaGit/OSCP-3

- https://github.com/ArcadeHustle/X3_USB_softmod

- https://github.com/Ascotbe/Kernelhub

- https://github.com/BinRacer/ms08-067

- https://github.com/BinRacer/ms08-067.py

- https://github.com/BrennanStJohn/Sample_Pentest

- https://github.com/BrunoCRovira/LegacyHTB

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/Cruxer8Mech/Idk

- https://github.com/H3xL00m/MS08-067

- https://github.com/JFR-C/Boot2root-CTFs-Writeups

- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups

- https://github.com/Kuromesi/Py4CSKG

- https://github.com/N3rdyN3xus/MS08-067

- https://github.com/NoTrustedx/Exploit_MS08-067

- https://github.com/NyxByt3/MS08-067

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/RodrigoVarasLopez/Download-Scanners-from-Nessus-8.7-using-the-API

- https://github.com/Seby26Dev/-HTB-Legacy

- https://github.com/SexyBeast233/SecBooks

- https://github.com/Sp3c73rSh4d0w/MS08-067

- https://github.com/TheLastochka/pentest

- https://github.com/TrojanAZhen/Self_Back

- https://github.com/VpSanta3/Rscan

- https://github.com/Y2FuZXBh/exploits

- https://github.com/ajb3932/AD_Pentesting

- https://github.com/amack3131/Legacy

- https://github.com/c0d3cr4f73r/MS08-067

- https://github.com/crypticdante/MS08-067

- https://github.com/cyberleelawat/LeelawatX-CVE-Hunter

- https://github.com/dtomic-ftnt/solution-pack-ips-alert-triage

- https://github.com/fei9747/WindowsElevation

- https://github.com/fortinet-fortisoar/solution-pack-ips-alert-triage

- https://github.com/grisuno/LazyOwn

- https://github.com/gwyomarch/Legacy-HTB-Writeup-FR

- https://github.com/h3x0v3rl0rd/MS08-067

- https://github.com/h3xcr4ck3r/MS08-067

- https://github.com/k4u5h41/MS08-067

- https://github.com/khansiddique/VulnHub-Boot2root-CTFs-Writeups

- https://github.com/limeg/ms08-067-case-study

- https://github.com/lyshark/Windows-exploits

- https://github.com/miguelvelazco/coffee-saver

- https://github.com/morkin1792/security-tests

- https://github.com/mssky9527/Rscan

- https://github.com/n0-traces/cve_monitor

- https://github.com/n3ov4n1sh/MS08-067

- https://github.com/n3rdh4x0r/MS08-067

- https://github.com/nanotechz9l/cvesearch

- https://github.com/nitishbadole/oscp-note-2

- https://github.com/notsag-dev/htb-legacy

- https://github.com/pxcs/CVE-29343-Sysmon-list

- https://github.com/rayhan0x01/reverse-shell-able-exploit-pocs

- https://github.com/rmsbpro/rmsbpro

- https://github.com/rsfl/pentest_safe

- https://github.com/shashihacks/OSCP

- https://github.com/shashihacks/OSWE

- https://github.com/thunderstrike9090/Conflicker_analysis_scripts

- https://github.com/uroboros-security/SMB-CVE

- https://github.com/willamygarcia/Vuln_Windows_7_11

- https://github.com/ycdxsb/WindowsPrivilegeEscalation