Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2017-0073: Windows GDI Information Disclosure Vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Microsoft CVE-2017-0073: Windows GDI Information Disclosure Vulnerability

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
03/14/2017
Created
07/25/2018
Added
03/14/2017
Modified
02/16/2023

Description

A Win32k information disclosure vulnerability exists when the Windows GDI component improperly discloses kernel memory addresses. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.

Solution(s)

  • msft-kb3127945-15d7f98f-d025-4ea5-89aa-6fbb09a41e73
  • msft-kb3127958-1364b203-6f20-4b86-a4cf-c977bf37eb8c
  • msft-kb3127958-e809e85f-8d03-43ba-b870-55dfd2084b01
  • msft-kb3172539-4e9f1258-ae51-48dd-9886-85876fb49145
  • msft-kb3172539-97245752-9ba4-4a22-8225-37a05ac53282
  • msft-kb3178693-0f296363-e0d8-4cbc-a557-c7b114aab3ff
  • msft-kb4010299-3d61872a-3049-497f-8035-de67cc6cd8db
  • msft-kb4010299-8ffb22e3-47ae-4712-8204-5bd087f061be
  • msft-kb4010301-b6fa22b4-e50e-4ace-97ca-5123b1ad8f09
  • msft-kb4012212-13c36c25-fee4-429f-933e-f93ebfbb91f5
  • msft-kb4012212-36e1591a-f6d3-44d2-aa25-540234b7eb36
  • msft-kb4012212-4ee6f09d-38d9-47ef-8ba9-dd802352b8ee
  • msft-kb4012212-652eea96-c2e8-4548-8f9a-40964e5e6a74
  • msft-kb4012212-c682d11d-fc2e-4852-9da7-c2198958bf6c
  • msft-kb4012212-fb31138f-b6a5-499c-9eb6-5b5f9fff6bfd
  • msft-kb4012213-317ca43c-7dfe-4e04-8a21-2c6c4ab4fbb9
  • msft-kb4012213-5d351df3-6efb-4b17-93e0-b0e3a5babbc3
  • msft-kb4012213-80bc2b42-a953-4096-8595-130e9a9c9fb9
  • msft-kb4012214-1949e6d5-95b0-4e90-acfb-73c9d295fbbf
  • msft-kb4012214-57dbd57f-89b2-4abb-8582-14fc17870bb8
  • msft-kb4012214-b4d71d8b-1f2d-4958-ad08-e379293d71e8
  • msft-kb4012583-1b63aa3c-f91b-46bf-962e-17498ed2ea98
  • msft-kb4012583-3b57a1e7-0ab1-42cf-b9f3-219763e8a914
  • msft-kb4012583-42807537-b593-4563-a113-39d694f30062
  • msft-kb4012583-5b5708ac-0980-45ae-8be0-8c1de5dda16b
  • msft-kb4012583-69655ee2-b6a2-4861-a7db-63458d2fe785
  • msft-kb4012583-74a23d5c-ef6f-4d05-8d73-c56397653c74
  • msft-kb4012583-b5a29dfd-eb86-4658-b2e6-484008a1d783
  • msft-kb4012583-bdedcab4-e7eb-441d-8cec-f5f117f678fc
  • msft-kb4012583-d2735278-3384-4173-8dcb-a420efb1e24b
  • msft-kb4012583-d4ab39a1-1433-4da5-a3c1-bfa2b0d7d3fb
  • msft-kb4012583-df17674b-e285-4b94-9c87-6179b28548f9
  • msft-kb4012583-e04de567-48d3-4d6a-b0db-9138fbd40b26
  • msft-kb4012583-fc2b107b-b264-49df-9bf0-c091f28f89a5
  • msft-kb4012606-384d5679-3c34-433f-8564-66fc5136a5e9
  • msft-kb4012606-6a38fe85-98ba-4ce2-b4eb-aed947d5c203
  • msft-kb4013198-477b54b9-913d-4c4e-8da8-01e0b4cf15ce
  • msft-kb4013198-6d9f75f7-d998-4188-a935-7603f4e51a4d
  • msft-kb4013429-724ee219-b949-4d44-9e02-e464c6062ae4
  • msft-kb4013429-74b1fe65-bd6b-4b76-a624-8674748898f2
  • msft-kb4013429-e29d1b22-493d-44dd-8857-7c6c7cb6d84c

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;