Lucene search

K
cve[email protected]CVE-2018-0969
HistoryApr 12, 2018 - 1:29 a.m.

CVE-2018-0969

2018-04-1201:29:00
NVD-CWE-noinfo
web.nvd.nist.gov
72
cve-2018-0969
information disclosure
windows kernel
aslr bypass
nvd
cve-2018-0887
cve-2018-0960
cve-2018-0968
cve-2018-0970
cve-2018-0971
cve-2018-0972
cve-2018-0973
cve-2018-0974
cve-2018-0975

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

4.9 Medium

AI Score

Confidence

High

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

37.6%

An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka “Windows Kernel Information Disclosure Vulnerability.” This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.

VendorProductVersionCPE
microsoftwindows_732-bit Systems Service Pack 1cpe:2.3:o:microsoft:windows_7:32-bit Systems Service Pack 1:*:*:*:*:*:*:*
microsoftwindows_7x64-based Systems Service Pack 1cpe:2.3:o:microsoft:windows_7:x64-based Systems Service Pack 1:*:*:*:*:*:*:*
microsoftwindows_server_2012_r2(Server Core installation)cpe:2.3:o:microsoft:windows_server_2012_r2:(Server Core installation):*:*:*:*:*:*:*
microsoftwindows_rt_8.1Windows RT 8.1cpe:2.3:o:microsoft:windows_rt_8.1:Windows RT 8.1:*:*:*:*:*:*:*
microsoftwindows_server_200832-bit Systems Service Pack 2cpe:2.3:o:microsoft:windows_server_2008:32-bit Systems Service Pack 2:*:*:*:*:*:*:*
microsoftwindows_server_200832-bit Systems Service Pack 2 (Server Core installation)cpe:2.3:o:microsoft:windows_server_2008:32-bit Systems Service Pack 2 (Server Core installation):*:*:*:*:*:*:*
microsoftwindows_server_2008Itanium-Based Systems Service Pack 2cpe:2.3:o:microsoft:windows_server_2008:Itanium-Based Systems Service Pack 2:*:*:*:*:*:*:*
microsoftwindows_server_2008x64-based Systems Service Pack 2cpe:2.3:o:microsoft:windows_server_2008:x64-based Systems Service Pack 2:*:*:*:*:*:*:*
microsoftwindows_server_2008x64-based Systems Service Pack 2 (Server Core installation)cpe:2.3:o:microsoft:windows_server_2008:x64-based Systems Service Pack 2 (Server Core installation):*:*:*:*:*:*:*
microsoftwindows_server_2012(Server Core installation)cpe:2.3:o:microsoft:windows_server_2012:(Server Core installation):*:*:*:*:*:*:*
Rows per page:
1-10 of 271

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

4.9 Medium

AI Score

Confidence

High

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

37.6%