7.8
CVSSv3

CVE-2023-23410

Published: 14/03/2023 Updated: 23/03/2023
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

This vulnerability allows local malicious users to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the http.sys kernel module. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2008 r2

microsoft windows server 2012 r2

microsoft windows server 2016 -

microsoft windows server 2012 -

microsoft windows server 2008 -

microsoft windows server 2019 -

microsoft windows server 2022 -

microsoft windows 11 22h2

microsoft windows 10 22h2

microsoft windows 10 1607

microsoft windows 10 21h2

microsoft windows 11 21h2

microsoft windows 10 20h2

microsoft windows 10 1809

microsoft windows 10 1507

Github Repositories

A small research of http.sys

httpsys research A small research of httpsys Description This is a small study of httpsys I was able to do some research on it, but I don't have time to finish them I hope this will help someone Vulnerabilities The CVE-2023-23410 vulnerability consists of a Service name size overflow You need to pass more than WORD, and call check via UlIsChannelBindChangeNeeded, th