Lucene search

K
zdiAnonymousZDI-13-171
HistoryJul 26, 2013 - 12:00 a.m.

Microsoft Windows win32k.sys Privilege Escalation Vulnerability

2013-07-2600:00:00
Anonymous
www.zerodayinitiative.com
23

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

80.2%

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must run a malicious executable. The specific flaw exists within the handling of Dynamic Data Exchange objects. The issue lies in the destruction of DDE objects within a thread. An attacker can leverage this to escalate their privileges and execute code under the context of SYSTEM.

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

80.2%