Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   OS (Microsoft)  >   Windows Kernel Vendors:   Microsoft
Windows Kernel Object Initialization Flaws Let Local Users Obtain Potentially Sensitive Information on the Target System
SecurityTracker Alert ID:  1038659
SecurityTracker URL:
CVE Reference:   CVE-2017-8469, CVE-2017-8471, CVE-2017-8473, CVE-2017-8475, CVE-2017-8477, CVE-2017-8479, CVE-2017-8481, CVE-2017-8483, CVE-2017-8485, CVE-2017-8489, CVE-2017-8491   (Links to External Site)
Date:  Jun 13 2017
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7 SP1, 2008 R2 SP1, 2008 SP2, 2012, 8.1, 2012 R2, RT 8.1, 10, 10 Version 1511, 2016, 10 Version 1607, 10 Version 1703
Description:   Multiple vulnerabilities were reported in the Windows Kernel. A local user can obtain potentially sensitive information.

A local user can run a specially crafted application to exploit a memory object initialization error in the Windows kernel and 'win32k.sys' and obtain potentially sensitive information on the target system.

Mateusz Jurczyk of Google Project Zero and fanxiaocao and pjf of IceSword Lab, Qihoo 360 reported these vulnerabilities.

Impact:   A local user can obtain potentially sensitive information on the target system.
Solution:   The vendor has issued a fix.

The Microsoft advisories are available at:

Vendor URL: (Links to External Site)
Cause:   Access control error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, LLC