2.1
CVSSv2

CVE-2018-0969

Published: 12/04/2018 Updated: 24/08/2020
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 215
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

An information disclosure vulnerability exists in the Windows kernel that could allow an malicious user to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 7 -

microsoft windows server 2012 r2

microsoft windows server 2008 -

microsoft windows 10 1607

microsoft windows 10 1709

microsoft windows 8.1

microsoft windows server 2016

microsoft windows server 2008 r2

microsoft windows 10

microsoft windows rt 8.1 -

microsoft windows server 2012 -

microsoft windows 10 1511

microsoft windows 10 1703

Exploits

/* We have discovered that the nt!NtQueryAttributesFile system call invoked with paths of certain kernel objects discloses uninitialized kernel stack memory to user-mode clients The vulnerability affects Windows 7 to 10, 32/64-bit The paths that we have observed to trigger the leak in our test Windows 10 (1709) 64-bit VM are: --- cut --- "\Arc ...