CVE-2018-8453

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*

History

07 Feb 2025, 17:15

Type Values Removed Values Added
References (BID) http://www.securityfocus.com/bid/105467 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/105467 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8453 - Patch, Vendor Advisory () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8453 - Patch, Vendor Advisory
References (MISC) https://securelist.com/cve-2018-8453-used-in-targeted-attack - Exploit, Technical Description, Third Party Advisory () https://securelist.com/cve-2018-8453-used-in-targeted-attack - Exploit, Technical Description, Third Party Advisory
References (SECTRACK) http://www.securitytracker.com/id/1041828 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041828 - Broken Link, Third Party Advisory, VDB Entry
References (MISC) http://packetstormsecurity.com/files/153669/Microsoft-Windows-NtUserSetWindowFNID-Win32k-User-Callback.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/153669/Microsoft-Windows-NtUserSetWindowFNID-Win32k-User-Callback.html - Exploit, Third Party Advisory, VDB Entry

24 Jul 2024, 16:47

Type Values Removed Values Added
CPE cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
First Time Microsoft windows Server 1709
Microsoft windows 10 1709
Microsoft windows 10 1703
Microsoft windows 10 1507
Microsoft windows 10 1803
Microsoft windows 10 1809
Microsoft windows Server 1803
Microsoft windows 10 1607
CWE CWE-404 NVD-CWE-noinfo
References (SECTRACK) http://www.securitytracker.com/id/1041828 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id/1041828 - Broken Link, Third Party Advisory, VDB Entry
References (MISC) http://packetstormsecurity.com/files/153669/Microsoft-Windows-NtUserSetWindowFNID-Win32k-User-Callback.html - (MISC) http://packetstormsecurity.com/files/153669/Microsoft-Windows-NtUserSetWindowFNID-Win32k-User-Callback.html - Exploit, Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/105467 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/105467 - Broken Link, Third Party Advisory, VDB Entry

Information

Published : 2018-10-10 13:29

Updated : 2025-04-07 18:22


NVD link : CVE-2018-8453

Mitre link : CVE-2018-8453


JSON object : View

Products Affected

microsoft

  • windows_7
  • windows_8.1
  • windows_10_1507
  • windows_10_1607
  • windows_server_1709
  • windows_10_1703
  • windows_server_2019
  • windows_10_1709
  • windows_rt_8.1
  • windows_10_1803
  • windows_10_1809
  • windows_server_2016
  • windows_server_2012
  • windows_server_1803
  • windows_server_2008