Skip to content

A Windows Kernel LPE exploit for HEVD.sys targeting a stack overflow vulnerability on Windows 10 64-bit 1607 (RS1)

Notifications You must be signed in to change notification settings

HaShem9/HEVD-Kernel-Stack-BOF-SMEP-Win10-64bit-1607

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

HEVD-Kernel-Stack-BOF-SMEP-1607

A Windows Kernel LPE exploit for HEVD targeting the Stack Overflow vulnerability on 1607 (RS1)

This exploit targets the classic stack buffer overflow vulnerability in the HEVD.sys driver, this exploit was written on Windows 10 64-bit 1607 so a SMEP (Supervisor Mode Execution Prevention) bypass is needed. This exploit builds a ROP chain to move the correct bits to disable SMEP into the CR4 (Control Register 4) Intel register. In order to build a ROP chain, leaking the NTOSKRNL.exe base address is needed (bypassing KASLR), this exploit using the EnumDeviceDrivers information leak to aid in offset calculations for the ROP chain.

image

About

A Windows Kernel LPE exploit for HEVD.sys targeting a stack overflow vulnerability on Windows 10 64-bit 1607 (RS1)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages