This Metasploit module exploits a NULL pointer dereference vulnerability in MNGetpItemFromIndex(), which is reachable via a NtUserMNDragOver() system call. The NULL pointer dereference occurs because the xxxMNFindWindowFromPoint() function does not effectively check the validity of the tagPOPUPMENU objects it processes before passing them on to MNGetpItemFromIndex(), where the NULL pointer dereference will occur. This module has been tested against Windows 7 x86 SP0 and SP1. Offsets within the solution may need to be adjusted to work with other versions of Windows, such as Windows Server 2008.
fb3cf21123b0e2fbb662a608751638e9471714e3f0e34de79dd880b595ae013c
Microsoft Windows Win32k local privilege escalation proof of concept exploit.
6774a9c3a588e5f20f4f14249b0356b8a13d70a8848eed507eb39dba135af5d3
This is a write up detailing the root cause of the kernel privilege escalation vulnerabilities Microsoft patched on March 12, 2019.
21972ee2969bde7c0fb73197ec2ceda1ff103835f938cd09ebaad29569f4f82a