CVE-2017-0005
HIGHCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
5Tags
Description
The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka "Windows GDI Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0001, CVE-2017-0025, and CVE-2017-0047.
Analysis
Windows GDI (Graphics Device Interface) allows local privilege escalation through improper memory handling, attributed to the Zirconium APT group and exploited alongside browser zero-days in targeted campaigns.
Technical Context
The vulnerability in the Windows GDI subsystem allows local code to escalate privileges through improper handling of GDI objects in memory. Exploitation involves creating specially crafted GDI operations that trigger kernel-mode memory corruption.
Affected Products
['Microsoft Windows Vista SP2 through Windows 10 1607', 'Microsoft Windows Server 2008 SP2 through Server 2016', 'Microsoft Windows RT 8.1']
Remediation
Apply Microsoft security update MS17-013. Deploy Windows Defender Exploit Guard with Attack Surface Reduction rules.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today