CVE-2015-1701
HIGHCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
5Tags
Description
Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."
Analysis
Win32k.sys in Windows Server 2003, Vista, and Server 2008 allows local privilege escalation through a kernel-mode vulnerability, exploited in the wild alongside browser zero-days in April 2015 as part of APT attack chains.
Technical Context
The vulnerability in the kernel-mode win32k.sys driver allows an attacker with code execution at user level to escalate to SYSTEM privileges. Win32k vulnerabilities are triggered through the GDI/USER subsystem's handling of window objects and messages.
Affected Products
['Microsoft Windows Server 2003 SP2', 'Microsoft Windows Vista SP2', 'Microsoft Windows Server 2008 SP2']
Remediation
Apply Microsoft security update MS15-051. These Windows versions are end-of-life and should be replaced. Implement modern endpoint protection with behavioral detection.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today