Full title: Windows 10 RCE (Sendbox Escape/Bypass ASLR/Bypass DEP) 0day Exploit Category: remote exploits Platform: windows 1. Affected OS: Windows 10 x86 x64 2 Vulnerable Target application versions and reliability. If 32 bit only, is 64 bit vulnerable? The vulnerability is present in the 32-bit and 64-bit versions of Windows 10 (1507, 1511, 1607, 1703). With this vulnerability, you can remote code execute in the target system via аny browser. 3. Tested, functional against target application versions, list complete point release range: Windows 10 x86 & x64 (1507, 1511, 1607, 1703), Google Chrome 58.0.3029.110, Mozilla Firefox 53.0.3, Opera 45. 4. Does this exploit affect the current target version? [X] Yes [ ] No 5. Exploit Type (select all that apply) [X] Remote code execution [ ] Privilege escalation [ ] Font based [X] Sandbox escape [ ] Information disclosure (peek) [ ] Code signing bypass [ ] Persistency 6. Delivery Method [X] Via web page [ ] Via file [ ] Via network protocol [ ] Local privilege escalation 7. Bug Class [X] memory corruption [ ] design/logic flaw (auth-bypass / update issues) [ ] input validation flaw (XSS/XSRF/SQLi/command injection, etc.) [ ] misconfiguration [ ] information disclosure [ ] cryptographic bug [ ] denial of service 8. Exploitation Parameters [X] Bypasses ASLR [X] Bypasses DEP / W ^ X [ ] Bypasses SMEP/PXN [X] Bypasses EMET Version 5.52± [ ] Bypasses CFG (Win 8.1) 9. Does it require additional work to be compatible with arbitrary payloads? [X] Yes [ ] No # 0day.today @ http://0day.today/