Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2020/May/34 | Mailing List Third Party Advisory |
http://twitter.com/symantec/statuses/590208710527549440 | Broken Link |
http://www.securityfocus.com/bid/74245 | Broken Link Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1032155 | Broken Link Third Party Advisory VDB Entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051 | Patch Vendor Advisory |
https://www.exploit-db.com/exploits/37049/ | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/37367/ | Exploit Third Party Advisory VDB Entry |
https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2015-04-21 10:59
Updated : 2024-07-16 17:34
NVD link : CVE-2015-1701
Mitre link : CVE-2015-1701
CVE.ORG link : CVE-2015-1701
JSON object : View
Products Affected
microsoft
- windows_7
- windows_2003_server
- windows_server_2008
- windows_vista
CWE