Vulnerability Name: CVE-2013-3661 (CCN-84571) Assigned: 2013-05-17 Published: 2013-05-17 Updated: 2019-02-26 Summary: The EPATHOBJ::bFlatten function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not check whether linked-list traversal is continually accessing the same list member, which allows local users to cause a denial of service (infinite traversal) via vectors that trigger a crafted PATHRECORD chain. CVSS v3 Severity: 6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
CVSS v2 Severity: 4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C )4.2 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:POC/RL:U/RC:UR )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C )4.2 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:POC/RL:U/RC:UR )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
Vulnerability Type: CWE-22 Vulnerability Consequences: Denial of Service References: Source: FULLDISC Type: UNKNOWN20130517 Re: exploitation ideas under memory pressure Source: FULLDISC Type: UNKNOWN20130603 Re: exploitation ideas under memory pressure Source: MITRE Type: CNACVE-2013-3661 Source: CCN Type: Full-disclosure Mailing List, Fri, 17 May 2013 14:26:10 -0700exploitation ideas under memory pressure Source: CCN Type: SA53435Microsoft Windows Kernel "win32k.sys" Privilege Escalation Vulnerability Source: SECUNIA Type: Vendor Advisory53435 Source: MISC Type: UNKNOWNhttp://twitter.com/taviso/statuses/335557286657400832 Source: MISC Type: UNKNOWNhttp://www.computerworld.com/s/article/9239477 Source: EXPLOIT-DB Type: UNKNOWN25611 Source: CCN Type: Microsoft Web siteMicrosoft Windows Source: OSVDB Type: UNKNOWN93539 Source: MISC Type: UNKNOWNhttp://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/ Source: CCN Type: BID-60159Microsoft Windows Kernel 'Win32k.sys' CVE-2013-3661 Local Denial Of Service Vulnerability Source: MISC Type: UNKNOWNhttp://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw Source: XF Type: UNKNOWNms-win-cve20133661-dos(84571) Source: CCN Type: Packet Storm Security [06-03-2013]Windows NT/2K/XP/2K3/VISTA/2K8/7/8 EPATHOBJ Local ring0 Source: EXPLOIT-DB Type: EXPLOITOffensive Security Exploit Database [05-21-2013] Source: EXPLOIT-DB Type: EXPLOITOffensive Security Exploit Database [06-03-2013] Vulnerable Configuration: Configuration 1 :cpe:/o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x86:* OR cpe:/o:microsoft:windows_8:-:*:*:*:pro_n:*:x64:* OR cpe:/o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_rt:-:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_8:-:*:*:*:pro_n:*:x86:* OR cpe:/o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x64:* Configuration CCN 1 :cpe:/o:microsoft:windows:server_2003:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows:xp:sp3:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows:xp:sp2:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x64:* OR cpe:/o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x86:* OR cpe:/o:microsoft:windows_8:-:-:-:*:-:-:x64:* OR cpe:/o:microsoft:windows_server_2012:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_rt:-:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_8:-:*:*:*:pro_n:*:x86:* Denotes that component is vulnerable BACK
microsoft windows xp - sp2
microsoft windows 7 - sp1
microsoft windows 8 - -
microsoft windows vista - sp2
microsoft windows server 2008 - sp2
microsoft windows rt -
microsoft windows xp * sp3
microsoft windows server 2003 * sp2
microsoft windows 8 - -
microsoft windows server 2012 -
microsoft windows server 2008 r2 sp1
microsoft windows 7 - sp1
microsoft windows server_2003 sp2
microsoft windows xp sp3
microsoft windows vista - sp2
microsoft windows server 2008 sp2
microsoft windows xp sp2
microsoft windows 7 - sp1
microsoft windows server 2008 r2 sp1
microsoft windows 7 - sp1
microsoft windows 8 - -
microsoft windows server 2012
microsoft windows rt -
microsoft windows 8 - -