CVE-2017-0263
HIGHCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
5Tags
Description
The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
Analysis
The Win32k kernel-mode driver allows local privilege escalation through a use-after-free in window object handling, chained with CVE-2017-0262 by APT28 for complete exploitation from document open to SYSTEM compromise.
Technical Context
The CWE-416 use-after-free in win32k.sys occurs during processing of window messages and object operations. A crafted sequence of window operations triggers freeing and reuse of a kernel object, allowing controlled writes to kernel memory for token manipulation.
Affected Products
['Microsoft Windows 7 SP1 through Windows 10 1703', 'Microsoft Windows Server 2008 SP2 through Server 2016', 'Microsoft Windows RT 8.1']
Remediation
Apply Microsoft security update. Deploy Windows Defender Exploit Guard ASR rules to block Office child process creation and win32k system call filtering from sandboxed processes.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today