win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Dereference Vulnerability."
History

Thu, 17 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published: 2013-07-10T01:00:00

Updated: 2024-10-17T18:56:52.016Z

Reserved: 2013-01-12T00:00:00

Link: CVE-2013-1340

cve-icon Vulnrichment

Updated: 2024-08-06T14:57:04.833Z

cve-icon NVD

Status : Modified

Published: 2013-07-10T03:46:09.747

Modified: 2024-10-17T19:35:06.720

Link: CVE-2013-1340

cve-icon Redhat

No data.