vulnerability

Microsoft Windows: CVE-2017-0263: Win32k Elevation of Privilege Vulnerability

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
May 9, 2017
Added
May 9, 2017
Modified
Sep 11, 2024

Description

The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."

Solution(s)

microsoft-windows-windows_10-1507-kb4019474microsoft-windows-windows_10-1511-kb4019473microsoft-windows-windows_10-1607-kb4019472microsoft-windows-windows_10-1703-kb4016871microsoft-windows-windows_server_2012-kb4019214microsoft-windows-windows_server_2012_r2-kb4019213microsoft-windows-windows_server_2016-1607-kb4019472msft-kb4019204-0c835bc6-fb1e-450c-aaa4-10768114a13fmsft-kb4019204-29032498-9d50-41e8-95e7-6910d1a0d0c0msft-kb4019204-29a9f16d-ae2a-405a-af9d-a7c9a819e4b0msft-kb4019204-55e1f26d-c3c3-44bb-9040-be2913d08c4emsft-kb4019204-68be9014-f31b-47fc-b9f1-8a6967402562msft-kb4019204-753e6c04-6095-4b00-8583-c66229a8f944msft-kb4019204-7cb3c113-0d5c-4dda-9a5a-106ec78bf31amsft-kb4019204-95198e41-1b24-4008-8827-c181a4c1844amsft-kb4019204-d606d257-2504-4f5a-851e-3a35f6b2276fmsft-kb4019204-f099f582-988c-45a0-bcfc-ae0b31222c4emsft-kb4019204-ff171a9c-2eb4-4508-b8b4-0a0a993e3dc2msft-kb4019213-3041ea24-871e-44bd-ad52-9b2620ca82bcmsft-kb4019213-3329281f-2407-4bda-b8a6-37dc9b1ef179msft-kb4019214-6dbabc80-d41f-4736-ad08-5c172cb9c274msft-kb4019214-79e81c68-ba95-4c77-a747-5f2effd6388emsft-kb4019263-46c89aaa-6d7f-48c4-abda-2e0709b58b71msft-kb4019263-a1d1d5c2-78be-44c0-b0eb-2706f1225447msft-kb4019263-c218dbd8-9396-4978-a84d-aeb7a2c77ce3msft-kb4019263-c4749633-16b1-4395-b0bd-1930ee20d5c6msft-kb4019263-cd7fd4a7-f4db-493d-8cc3-70d33e708775msft-kb4019263-d8a880a2-6caa-453f-81c8-c6a88bf19d69
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.