The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the PATHRECORD chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many FlattenPath function calls, aka "Win32k Read AV Vulnerability."
References
Configurations
Configuration 1 (hide)
|
History
20 Dec 2024, 03:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://twitter.com/taviso/statuses/335557286657400832 - Not Applicable | |
References | () http://www.computerworld.com/s/article/9239477 - Broken Link | |
References | () http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0006.html - Broken Link | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17360 - Broken Link | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 - Patch, Vendor Advisory | |
References | () http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw - Press/Media Coverage | |
References | () http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0090.html - Broken Link | |
References | () http://secunia.com/advisories/53435 - Broken Link, Vendor Advisory | |
References | () http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/ - Exploit, Issue Tracking | |
References | () http://www.osvdb.org/93539 - Broken Link | |
References | () http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0094.html - Broken Link | |
References | () http://www.exploit-db.com/exploits/25611/ - Exploit, Third Party Advisory, VDB Entry | |
References | () http://twitter.com/taviso/statuses/309157606247768064 - Exploit | |
References | () http://www.us-cert.gov/ncas/alerts/TA13-190A - Third Party Advisory, US Government Resource |
09 Jul 2024, 18:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:* cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:* |
First Time |
Microsoft windows Rt
|
|
References | (SECUNIA) http://secunia.com/advisories/53435 - Broken Link, Vendor Advisory | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17360 - Broken Link | |
References | (MISC) http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw - Press/Media Coverage | |
References | (FULLDISC) http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0006.html - Broken Link | |
References | (EXPLOIT-DB) http://www.exploit-db.com/exploits/25611/ - Exploit, Third Party Advisory, VDB Entry | |
References | (MISC) http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/ - Exploit, Issue Tracking | |
References | (MISC) http://www.computerworld.com/s/article/9239477 - Broken Link | |
References | (FULLDISC) http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0090.html - Broken Link | |
References | (MS) https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053 - Patch, Vendor Advisory | |
References | (CERT) http://www.us-cert.gov/ncas/alerts/TA13-190A - Third Party Advisory, US Government Resource | |
References | (FULLDISC) http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0094.html - Broken Link | |
References | (OSVDB) http://www.osvdb.org/93539 - Broken Link | |
References | (MISC) http://twitter.com/taviso/statuses/335557286657400832 - Not Applicable | |
CVSS |
v2 : v3 : |
v2 : 6.9
v3 : 7.8 |
Information
Published : 2013-05-24 20:55
Updated : 2025-04-03 20:40
NVD link : CVE-2013-3660
Mitre link : CVE-2013-3660
JSON object : View
Products Affected
microsoft
- windows_7
- windows_vista
- windows_8
- windows_xp
- windows_server_2003
- windows_rt
- windows_server_2012
- windows_server_2008
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer