Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2017-0246: Win32k Elevation of Privilege Vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Microsoft CVE-2017-0246: Win32k Elevation of Privilege Vulnerability

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
05/09/2017
Created
07/25/2018
Added
05/09/2017
Modified
11/18/2021

Description

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.

Solution(s)

  • msft-kb4016871-3f4526c4-d3ec-486a-a7ef-8d1987905310
  • msft-kb4016871-cf89e515-56cd-4e4f-b5ca-31b3ea1e81b3
  • msft-kb4019204-0c835bc6-fb1e-450c-aaa4-10768114a13f
  • msft-kb4019204-29032498-9d50-41e8-95e7-6910d1a0d0c0
  • msft-kb4019204-29a9f16d-ae2a-405a-af9d-a7c9a819e4b0
  • msft-kb4019204-55e1f26d-c3c3-44bb-9040-be2913d08c4e
  • msft-kb4019204-68be9014-f31b-47fc-b9f1-8a6967402562
  • msft-kb4019204-753e6c04-6095-4b00-8583-c66229a8f944
  • msft-kb4019204-7cb3c113-0d5c-4dda-9a5a-106ec78bf31a
  • msft-kb4019204-95198e41-1b24-4008-8827-c181a4c1844a
  • msft-kb4019204-d606d257-2504-4f5a-851e-3a35f6b2276f
  • msft-kb4019204-f099f582-988c-45a0-bcfc-ae0b31222c4e
  • msft-kb4019204-ff171a9c-2eb4-4508-b8b4-0a0a993e3dc2
  • msft-kb4019213-2913676b-33a1-4557-9160-f36bfed5f294
  • msft-kb4019213-3041ea24-871e-44bd-ad52-9b2620ca82bc
  • msft-kb4019213-3329281f-2407-4bda-b8a6-37dc9b1ef179
  • msft-kb4019214-6dbabc80-d41f-4736-ad08-5c172cb9c274
  • msft-kb4019214-79e81c68-ba95-4c77-a747-5f2effd6388e
  • msft-kb4019214-9b0cfbdc-1a83-4ff0-b80c-d1b4f1475cc7
  • msft-kb4019263-46c89aaa-6d7f-48c4-abda-2e0709b58b71
  • msft-kb4019263-a1d1d5c2-78be-44c0-b0eb-2706f1225447
  • msft-kb4019263-c218dbd8-9396-4978-a84d-aeb7a2c77ce3
  • msft-kb4019263-c4749633-16b1-4395-b0bd-1930ee20d5c6
  • msft-kb4019263-cd7fd4a7-f4db-493d-8cc3-70d33e708775
  • msft-kb4019263-d8a880a2-6caa-453f-81c8-c6a88bf19d69
  • msft-kb4019472-95ff788a-8fe4-4584-bfca-7051b92405b2
  • msft-kb4019472-970dc0b3-07a2-4434-8df0-9008dcdc9f36
  • msft-kb4019472-bf47cd35-d39a-426f-8884-ffcd8bd9c49a
  • msft-kb4019473-55f05839-b358-4f0d-bcef-683de665b62c
  • msft-kb4019473-e7400165-c486-4e3e-aabc-24d04ef1dbe6
  • msft-kb4019474-15928377-0964-4b80-9021-1ab7230cc690
  • msft-kb4019474-6964cf08-89cf-4a95-ace6-fdb7a423c09c

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;