This Metasploit module checks a range of hosts for the CVE-2019-0708 vulnerability by binding the MS_T120 channel outside of its normal slot and sending non-DoS packets which respond differently on patched and vulnerable hosts. It can optionally trigger the DoS vulnerability.
6a4a44bfa015ee1e424da3c229e217a013236f2eec5a985ec1f2d2bbef888f5f
Proof of concept exploit for a remote code execution vulnerability in Microsoft's RDP service.
6d22c79340f19a7303c4fe1251a1c8e3e6781fc8551886316a0e4e976e9a6dbf
Microsoft Windows 7 (x86) BlueKeep remote desktop protocol windows kernel use-after-free exploit.
6004557d41e57d6f8c6f1e069e636a6c4bd77559c9d558f5f217529403730a3e
The RDP termdd.sys driver improperly handles binds to internal-only channel MS_T120, allowing a malformed Disconnect Provider Indication message to cause a use-after-free. With a controllable data/size remote nonpaged pool spray, an indirect call gadget of the freed channel is used to achieve arbitrary code execution.
1aecbe52ce929c3de3a4cf90e7b8a03dc74a2a1edd4797fbc7bf61bee611bb3c
Whitepaper called Exploitation of Windows CVE-2019-0708 (BlueKeep): Three Ways to Write Data into the Kernel with RDP PDU.
615c4c90bab25f8bcbe32d7ac74b9cdce7022be0b95aef6226dd3a6f903a170b
This whitepaper discusses low-level reversing of the BLUEKEEP vulnerability.
0677b8441e78f758bec54dab3454d421969b72e6583840ca61e41fe11d0be904
This whitepaper is a technical analysis of BlueKeep with a path for exploitation.
ffdeadc2f367f61101c6ab776714306ed8c3b691ec3ec119b2210036e68722b9
Microsoft Windows Remote Desktop BlueKeep denial of service exploit.
fd14625fe2ae16af44ddb6f7a27ab38b1fdc86ac051a831939a1eb569a859ea5
Whitepaper called A Debugging Primer with CVE-2019-0708.
8a490bd9b4cf02bf2322a6a12134e78c3fba950413a6f733e2fa24d02ea83729
Microsoft Windows Remote Desktop BlueKeep denial of service exploit.
12f1ce90327e477e2b6666c24b8434b49b8d09e8fc972915cbc601e0c5244dff