This is a (rather flaky) poc for CVE-2024-38063, a RCE in tcpip.sys patched on August 13th 2024. I didn’t find and report this vuln, that would be Wei.
pip3 install scapy
pip3 install scapy
python3 cve-2024-38063.py
The easiest way to reproduce the vuln is by using bcdedit /set debug on
on the target system and restarting the machine/VM.
This makes the default network adapter driver kdnic.sys
, which is very happy to coalesce packets.
If you’re trying to reproduce the vuln on a different setup, you’ll need to get the system in a position where it will coalesce the packets you sent. You can read the troubleshooting section below on more details.
You can read this great analysis of the vulnerability by Marcus if you’re interested in the technical details. The details I’ve written below are meant to serve as a summary, rather than serious technical analysis.
NET_BUFFER
object which contains buffered packet data. 0x30
we also have a current-offset field which indicates how far the packet has been parsed. At this stage, the offset value will generally be 0x28
, indicating that the IPv6 header has been parsed but nothing else.tcpip!Ipv6pReceiveDestinationOptions
, a parsing error will result in tcpip!IppSendErrorList
being called. This function calls tcpip!IppSendError
on each packet object in the linked list (starting from the current one).tcpip!IppSendError
has side effects. It “reverts” the buffered packet data back to the start and resets the current-offset field to zero.0x8C
). IppSendError
.0x28
.For more information click here.
garak checks if an LLM can be made to fail in a way we don't…
Vermilion is a simple and lightweight CLI tool designed for rapid collection, and optional exfiltration…
ADCFFS is a PowerShell script that can be used to exploit the AD CS container…
Tartufo will, by default, scan the entire history of a git repository for any text…
Loco is strongly inspired by Rails. If you know Rails and Rust, you'll feel at…
A data hoarder’s dream come true: bundle any web page into a single HTML file.…