CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
12.8%
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly initialize function buffers, which allows local users to obtain sensitive information from kernel memory, and possibly bypass the ASLR protection mechanism, via a crafted application, aka “Microsoft Windows Kernel Memory Disclosure Vulnerability.”
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | windows_7 | - | cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* |
microsoft | windows_8 | - | cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:* |
microsoft | windows_8.1 | - | cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* |
microsoft | windows_rt | - | cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:* |
microsoft | windows_rt_8.1 | - | cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:* |
microsoft | windows_server_2003 | - | cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:* |
microsoft | windows_server_2008 | - | cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* |
microsoft | windows_server_2008 | r2 | cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:* |
microsoft | windows_server_2008 | r2 | cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* |
microsoft | windows_server_2012 | - | cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* |