CVE-2013-3660
The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the PATHRECORD chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many FlattenPath function calls, aka "Win32k Read AV Vulnerability."
Published
2013-05-24T20:55:01.903
Last Modified
2025-04-11T00:51:21.963
Status
Deferred
Source
[email protected]
Severity
CVSSv3.1: 7.8 (HIGH)
CVSSv2 Vector
AV:L/AC:M/Au:N/C:C/I:C/A:C
- Access Vector: LOCAL
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
3.4
Impact Score
10.0
Weaknesses
-
Type: Primary
CWE-119
-
Type: Secondary
CWE-119
Affected Vendors & Products
References
-
http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0090.html
Broken Link
([email protected])
-
http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0094.html
Broken Link
([email protected])
-
http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0006.html
Broken Link
([email protected])
-
http://secunia.com/advisories/53435
Broken Link, Vendor Advisory
([email protected])
-
http://twitter.com/taviso/statuses/309157606247768064
Exploit
([email protected])
-
http://twitter.com/taviso/statuses/335557286657400832
Not Applicable
([email protected])
-
http://www.computerworld.com/s/article/9239477
Broken Link
([email protected])
-
http://www.exploit-db.com/exploits/25611/
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
http://www.osvdb.org/93539
Broken Link
([email protected])
-
http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/
Exploit, Issue Tracking
([email protected])
-
http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw
Press/Media Coverage
([email protected])
-
http://www.us-cert.gov/ncas/alerts/TA13-190A
Third Party Advisory, US Government Resource
([email protected])
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053
Patch, Vendor Advisory
([email protected])
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17360
Broken Link
([email protected])
-
http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0090.html
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0094.html
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0006.html
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/53435
Broken Link, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://twitter.com/taviso/statuses/309157606247768064
Exploit
(af854a3a-2127-422b-91ae-364da2661108)
-
http://twitter.com/taviso/statuses/335557286657400832
Not Applicable
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.computerworld.com/s/article/9239477
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.exploit-db.com/exploits/25611/
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.osvdb.org/93539
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/
Exploit, Issue Tracking
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw
Press/Media Coverage
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.us-cert.gov/ncas/alerts/TA13-190A
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17360
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)