CVE-2017-0175
The Windows kernel in Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows authenticated attackers to obtain sensitive information via a specially crafted document, aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-0220, CVE-2017-0258, and CVE-2017-0259.
Published
2017-05-12T14:29:01.223
Last Modified
2025-04-20T01:37:25.860
Status
Deferred
Source
[email protected]
Severity
CVSSv3.0: 4.7 (MEDIUM)
CVSSv2 Vector
AV:L/AC:L/Au:N/C:P/I:N/A:N
- Access Vector: LOCAL
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: NONE
- Availability Impact: NONE
Exploitability Score
3.9
Impact Score
2.9
Weaknesses
Affected Vendors & Products
References
-
http://www.securityfocus.com/bid/98110
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id/1038452
Third Party Advisory, VDB Entry
([email protected])
-
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0175
Mitigation, Patch, Vendor Advisory
([email protected])
-
https://www.exploit-db.com/exploits/42009/
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securityfocus.com/bid/98110
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id/1038452
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0175
Mitigation, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.exploit-db.com/exploits/42009/
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)