Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j8xv-9pjh-mqw5

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to bypass the KASLR protection mechanism, and consequently discover a driver base address, via a crafted application, aka "Windows Kernel Memory Information Disclosure Vulnerability."

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to bypass the KASLR protection mechanism, and consequently discover a driver base address, via a crafted application, aka "Windows Kernel Memory Information Disclosure Vulnerability."

EPSS

Процентиль: 88%
0.03818
Низкий

Дефекты

CWE-200

Связанные уязвимости

nvd
около 10 лет назад

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to bypass the KASLR protection mechanism, and consequently discover a driver base address, via a crafted application, aka "Windows Kernel Memory Information Disclosure Vulnerability."

fstec
около 10 лет назад

Уязвимость операционной системы Windows, позволяющая нарушителю обойти механизм защиты KASLR

EPSS

Процентиль: 88%
0.03818
Низкий

Дефекты

CWE-200