CVE-2015-2527

The process-initialization implementation in win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:27

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/76599 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/76599 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1033485 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1033485 - Third Party Advisory, VDB Entry
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097 - Patch, Vendor Advisory () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097 - Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/38199/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/38199/ - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2015-09-09 00:59

Updated : 2024-11-21 02:27


NVD link : CVE-2015-2527

Mitre link : CVE-2015-2527

CVE.ORG link : CVE-2015-2527


JSON object : View

Products Affected

microsoft

  • windows_rt
  • windows_8.1
  • windows_rt_8.1
  • windows_server_2012
  • windows_10
  • windows_8
CWE
CWE-264

Permissions, Privileges, and Access Controls