This is a (rather flaky) poc for CVE-2024-38063, a RCE in tcpip.sys patched on August 13th 2024. I didn’t find and report this vuln, that would be Wei.
pip3 install scapy
pip3 install scapy
python3 cve-2024-38063.py
The easiest way to reproduce the vuln is by using bcdedit /set debug on
on the target system and restarting the machine/VM.
This makes the default network adapter driver kdnic.sys
, which is very happy to coalesce packets.
If you’re trying to reproduce the vuln on a different setup, you’ll need to get the system in a position where it will coalesce the packets you sent. You can read the troubleshooting section below on more details.
You can read this great analysis of the vulnerability by Marcus if you’re interested in the technical details. The details I’ve written below are meant to serve as a summary, rather than serious technical analysis.
NET_BUFFER
object which contains buffered packet data. 0x30
we also have a current-offset field which indicates how far the packet has been parsed. At this stage, the offset value will generally be 0x28
, indicating that the IPv6 header has been parsed but nothing else.tcpip!Ipv6pReceiveDestinationOptions
, a parsing error will result in tcpip!IppSendErrorList
being called. This function calls tcpip!IppSendError
on each packet object in the linked list (starting from the current one).tcpip!IppSendError
has side effects. It “reverts” the buffered packet data back to the start and resets the current-offset field to zero.0x8C
). IppSendError
.0x28
.For more information click here.
Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…
This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…
The free and open-source security platform SecHub, provides a central API to test software with…
Don't worry if there are any bugs in the tool, we will try to fix…