Fail to alloc null page!
RaphaelVAnderson opened this issue · comments
I ran it on win-2008 x64 but i get this message:
[+] Detected kernel ntoskrnl.exe
[-] Fail to alloc null page!
Why did this happen?
How can i do?
It simply means failure in mapping the null page (zero address page).
Since the vulnerability is null pointer deference , zero page is required while exploiting this type of vulnerability.
Actually I have no idea what's happening because I exploit my win 2008 x64 (Datacenter) successfully.
my win 2008 x64 also shows:
[+] Detected kernel ntoskrnl.exe
[-] Fail to alloc null page!
i think it is because of hotfix KB3033929, please confirm!
also cant be the addresses changed?
i mean by allocating memory somewhere else?
@0x410c No, it must be allocated exactly at null page.
Well, I don't see anything affecting null page allocation from , why u think this patch affects ?
i dont have any official refrences to give but it seems, after this hotfix ntAllocateVirtualMemory return INVALID_PARAMATER_2 error if the allocation address is less than 0x1000.