9.3
CVSSv2

CVE-2016-0170

Published: 11/05/2016 Updated: 12/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

GDI in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote malicious users to execute arbitrary code via a crafted document, aka "Windows Graphics Component RCE Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2012

microsoft windows 8.1

microsoft windows 7 -

microsoft windows 7

microsoft windows 10 1511

microsoft windows 10

microsoft windows server 2008 r2

microsoft windows server 2008

microsoft windows rt 8.1

microsoft windows server 2012 r2

microsoft windows vista

Exploits

Source: bugschromiumorg/p/project-zero/issues/detail?id=731 Two of the escape codes supported by the public ExtEscape() API are POSTSCRIPT_IDENTIFY and POSTSCRIPT_INJECTION, which are only processed if the Device Context is associated with a printer In the code responsible for handling the two escape codes, we can find the following con ...