An elevation of privilege vulnerability exists in Windows 10 when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode, aka "Win32k Elevation of Privilege Vulnerability." This CVE ID is unique from CVE-2017-0188.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/97420 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038239 | |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0189 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/97420 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038239 | |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0189 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/97420 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1038239 - | |
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0189 - Patch, Vendor Advisory |
Information
Published : 2017-04-12 14:59
Updated : 2024-11-21 03:02
NVD link : CVE-2017-0189
Mitre link : CVE-2017-0189
CVE.ORG link : CVE-2017-0189
JSON object : View
Products Affected
microsoft
- windows_10
- windows_server_2016
CWE