The EPATHOBJ::bFlatten function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not check whether linked-list traversal is continually accessing the same list member, which allows local users to cause a denial of service (infinite traversal) via vectors that trigger a crafted PATHRECORD chain.
2013-05-24T20:55:01.940
2025-04-11T00:51:21.963
Deferred
CVSSv2: 4.9 (MEDIUM)
AV:L/AC:L/Au:N/C:N/I:N/A:C
3.9
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | microsoft | windows_7 | - | Yes |
Operating System | microsoft | windows_7 | - | Yes |
Operating System | microsoft | windows_8 | - | Yes |
Operating System | microsoft | windows_8 | - | Yes |
Operating System | microsoft | windows_rt | - | Yes |
Operating System | microsoft | windows_server_2003 | * | Yes |
Operating System | microsoft | windows_server_2008 | - | Yes |
Operating System | microsoft | windows_server_2008 | r2 | Yes |
Operating System | microsoft | windows_server_2012 | - | Yes |
Operating System | microsoft | windows_vista | - | Yes |
Operating System | microsoft | windows_xp | * | Yes |
Operating System | microsoft | windows_xp | - | Yes |