7.8
CVSSv3

CVE-2016-0143

Published: 12/04/2016 Updated: 12/10/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0165 and CVE-2016-0167.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 8.1

microsoft windows 7

microsoft windows 10 1511

microsoft windows server 2008 r2

microsoft windows server 2008

microsoft windows server 2012 r2

microsoft windows server 2012 -

microsoft windows 10 -

microsoft windows rt 8.1 -

microsoft windows vista

Exploits

Source: bugschromiumorg/p/project-zero/issues/detail?id=707 The attached testcases crashes Windows 7 64-bit while attempting to write to an unmapped memory region On 32-bit Windows 7 it triggers a null pointer read Proof of Concept: githubcom/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39712zip ...