2.1
CVSSv2

CVE-2015-6102

Published: 11/11/2015 Updated: 16/05/2019
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 215
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to bypass the KASLR protection mechanism, and consequently discover a driver base address, via a crafted application, aka "Windows Kernel Memory Information Disclosure Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 8.1 -

microsoft windows server 2008 r2

microsoft windows 7 -

microsoft windows server 2008 -

microsoft windows vista -

microsoft windows 10 1511

microsoft windows rt -

microsoft windows rt 8.1 -

microsoft windows server 2012 -

microsoft windows 10 -

microsoft windows server 2012 r2

microsoft windows 8 -

Exploits

Source: codegooglecom/p/google-security-research/issues/detail?id=510 The attached poc crashes 32-bit Windows 7 with a screen resolution of 1024x768 and 32bit color depth The crash occurs during a memmove opperation while copying the cursor content from unmapped memory This could potentially be used by an attacker to leak kernel memory ...