Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2020-1034

Description

An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.

The security update addresses the vulnerability by ensuring the Windows Kernel properly handles objects in memory.

POC

Reference

No PoCs from references.

Github

- https://github.com/404notf0und/CVE-Flow

- https://github.com/ARPSyndicate/cvemon

- https://github.com/Cruxer8Mech/Idk

- https://github.com/ExpLife0011/awesome-windows-kernel-security-development

- https://github.com/GeorgiiFirsov/CVE-2020-1034

- https://github.com/GeorgyFirsov/CVE-2020-1034

- https://github.com/NetW0rK1le3r/awesome-hacking-lists

- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories

- https://github.com/SexyBeast233/SecBooks

- https://github.com/alphaSeclab/sec-daily-2020

- https://github.com/anquanscan/sec-tools

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/hktalent/bug-bounty

- https://github.com/lyshark/Windows-exploits

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/pravinsrc/NOTES-windows-kernel-links

- https://github.com/readloud/Awesome-Stars

- https://github.com/soosmile/POC

- https://github.com/taielab/awesome-hacking-lists

- https://github.com/yardenshafir/CVE-2020-1034

- https://github.com/ycdxsb/WindowsPrivilegeEscalation