Description
The kernel in Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to bypass the KASLR protection mechanism, and consequently discover a driver base address, via a crafted application, aka "Windows Kernel Memory Information Disclosure Vulnerability."
Published: 2015-11-11
Score: 2.1 Low
EPSS: 2.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2015-6052 The kernel in Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to bypass the KASLR protection mechanism, and consequently discover a driver base address, via a crafted application, aka "Windows Kernel Memory Information Disclosure Vulnerability."
History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.03089}

epss

{'score': 0.0288}


Subscriptions

Microsoft Windows 10 Windows 8.1 Windows Rt 8.1 Windows Server 2012
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2024-08-06T07:15:12.464Z

Reserved: 2015-08-14T00:00:00.000Z

Link: CVE-2015-6109

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-11-11T12:59:43.717

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-6109

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses