Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Vista SP1 and SP2 and Server 2008 Gold and SP2 allows local users to gain privileges or cause a denial of service (system crash) by using a large number of calls to the NtUserCheckAccessForIntegrityLevel function to trigger a failure in the LockProcessByClientId function, leading to deletion of an in-use process object, aka "Win32k Reference Count Vulnerability."
2010-07-02T19:00:01.003
2025-04-11T00:51:21.963
Deferred
CVSSv2: 7.2 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | - | Yes |
Operating System | microsoft | windows_vista | * | Yes |
Operating System | microsoft | windows_vista | * | Yes |