HIGH · 7.2

CVE-2013-3907

portcls.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain priv...

Vulnerability Description

portcls.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Port-Class Driver Double Fetch Vulnerability."

CVSS Score

7.2

HIGH

AV:L/AC:L/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
MicrosoftWindows 7All versions
MicrosoftWindows 8-
MicrosoftWindows Rt-
MicrosoftWindows Server 2008All versions
MicrosoftWindows Server 2012-
MicrosoftWindows VistaAll versions

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-3907?

CVE-2013-3907 is a vulnerability with a CVSS score of 7.2 (HIGH). portcls.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain priv...

How severe is CVE-2013-3907?

CVE-2013-3907 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-3907?

Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows 7, Microsoft Windows 8, Microsoft Windows Rt, Microsoft Windows Server 2008, Microsoft Windows Server 2012.