Vulnerability Description
The kernel API in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows Server 2012 mishandles registry objects in memory, which allows local users to gain privileges via a crafted application, aka "Windows Registry Elevation of Privilege Vulnerability."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows 7 | - |
| Microsoft | Windows Server 2008 | - |
| Microsoft | Windows Server 2012 | - |
| Microsoft | Windows Vista | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/96623Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038013
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0103Vendor Advisory
- https://www.exploit-db.com/exploits/41645/
- http://www.securityfocus.com/bid/96623Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038013
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0103Vendor Advisory
- https://www.exploit-db.com/exploits/41645/
FAQ
What is CVE-2017-0103?
CVE-2017-0103 is a vulnerability with a CVSS score of 7.0 (HIGH). The kernel API in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows Server 2012 mishandles registry objects in memory, which allows local users to gain privil...
How severe is CVE-2017-0103?
CVE-2017-0103 has been rated HIGH with a CVSS base score of 7.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-0103?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows 7, Microsoft Windows Server 2008, Microsoft Windows Server 2012, Microsoft Windows Vista.