Vulnerability Description
The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the PATHRECORD chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many FlattenPath function calls, aka "Win32k Read AV Vulnerability."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows 7 | - |
| Microsoft | Windows 8 | - |
| Microsoft | Windows Rt | - |
| Microsoft | Windows Server 2003 | - |
| Microsoft | Windows Server 2008 | - |
| Microsoft | Windows Server 2012 | - |
| Microsoft | Windows Vista | - |
| Microsoft | Windows Xp | - |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0090.htmlBroken Link
- http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0094.htmlBroken Link
- http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0006.htmlBroken Link
- http://secunia.com/advisories/53435Broken LinkVendor Advisory
- http://twitter.com/taviso/statuses/309157606247768064Exploit
- http://twitter.com/taviso/statuses/335557286657400832Not Applicable
- http://www.computerworld.com/s/article/9239477Broken Link
- http://www.exploit-db.com/exploits/25611/ExploitThird Party AdvisoryVDB Entry
- http://www.osvdb.org/93539Broken Link
- http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnExploitIssue Tracking
- http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-disclPress/Media Coverage
- http://www.us-cert.gov/ncas/alerts/TA13-190AThird Party AdvisoryUS Government Resource
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-05PatchVendor Advisory
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Broken Link
- http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0090.htmlBroken Link
FAQ
What is CVE-2013-3660?
CVE-2013-3660 is a vulnerability with a CVSS score of 7.8 (HIGH). The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windo...
How severe is CVE-2013-3660?
CVE-2013-3660 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-3660?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows 7, Microsoft Windows 8, Microsoft Windows Rt, Microsoft Windows Server 2003, Microsoft Windows Server 2008.