725
VMScore

CVE-2016-0173

Published: 11/05/2016 Updated: 12/10/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0171, CVE-2016-0174, and CVE-2016-0196.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows rt 8.1

microsoft windows server 2012 r2

microsoft windows 7

microsoft windows 10 1511

microsoft windows 8.1

microsoft windows server 2008 r2

microsoft windows vista

microsoft windows server 2012

microsoft windows 10

microsoft windows server 2008

Exploits

Source: bugschromiumorg/p/project-zero/issues/detail?id=747 The attached PoC crashes 32-bit Windows 7 with special pool enabled on win32ksys It might take several runs in order to reproduce Tested the PoC on a single core VM Proof of Concept: githubcom/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39960z ...