Vulnerability Description
The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow local users to obtain sensitive information about kernel-object addresses, and consequently bypass the KASLR protection mechanism, via a crafted application, aka "Win32k Information Disclosure Vulnerability."
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows 10 | All versions |
| Microsoft | Windows 7 | All versions |
| Microsoft | Windows 8.1 | All versions |
| Microsoft | Windows Rt 8.1 | All versions |
| Microsoft | Windows Server 2008 | All versions |
| Microsoft | Windows Server 2012 | - |
| Microsoft | Windows Vista | All versions |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/90027
- http://www.securitytracker.com/id/1035841
- http://www.zerodayinitiative.com/advisories/ZDI-16-281
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-06
- http://www.securityfocus.com/bid/90027
- http://www.securitytracker.com/id/1035841
- http://www.zerodayinitiative.com/advisories/ZDI-16-281
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-06
FAQ
What is CVE-2016-0175?
CVE-2016-0175 is a vulnerability with a CVSS score of 3.3 (LOW). The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 al...
How severe is CVE-2016-0175?
CVE-2016-0175 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-0175?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows 10, Microsoft Windows 7, Microsoft Windows 8.1, Microsoft Windows Rt 8.1, Microsoft Windows Server 2008.