An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/153669/Microsoft-Windows-NtUserSetWindowFNID-Win32k-User-Callback.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/105467 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1041828 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8453 - Patch, Vendor Advisory | |
References | () https://securelist.com/cve-2018-8453-used-in-targeted-attack - Exploit, Technical Description, Third Party Advisory |
24 Jul 2024, 16:47
Type | Values Removed | Values Added |
---|---|---|
First Time |
Microsoft windows Server 1803
Microsoft windows 10 1803 Microsoft windows Server 1709 Microsoft windows 10 1809 Microsoft windows 10 1709 Microsoft windows 10 1507 Microsoft windows 10 1703 Microsoft windows 10 1607 |
|
CPE | cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* |
References | () http://packetstormsecurity.com/files/153669/Microsoft-Windows-NtUserSetWindowFNID-Win32k-User-Callback.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/105467 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1041828 - Broken Link, Third Party Advisory, VDB Entry | |
CWE | NVD-CWE-noinfo |
Information
Published : 2018-10-10 13:29
Updated : 2024-11-21 04:13
NVD link : CVE-2018-8453
Mitre link : CVE-2018-8453
CVE.ORG link : CVE-2018-8453
JSON object : View
Products Affected
microsoft
- windows_10_1709
- windows_10_1703
- windows_10_1507
- windows_7
- windows_server_1709
- windows_server_1803
- windows_8.1
- windows_rt_8.1
- windows_10_1809
- windows_10_1607
- windows_server_2016
- windows_server_2019
- windows_server_2012
- windows_server_2008
- windows_10_1803
CWE