Vulnerability Name:

CVE-2013-3661 (CCN-84571)

Assigned:2013-05-17
Published:2013-05-17
Updated:2019-02-26
Summary:The EPATHOBJ::bFlatten function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not check whether linked-list traversal is continually accessing the same list member, which allows local users to cause a denial of service (infinite traversal) via vectors that trigger a crafted PATHRECORD chain.
CVSS v3 Severity:6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
4.2 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:POC/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
4.2 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:POC/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-22
Vulnerability Consequences:Denial of Service
References:Source: FULLDISC
Type: UNKNOWN
20130517 Re: exploitation ideas under memory pressure

Source: FULLDISC
Type: UNKNOWN
20130603 Re: exploitation ideas under memory pressure

Source: MITRE
Type: CNA
CVE-2013-3661

Source: CCN
Type: Full-disclosure Mailing List, Fri, 17 May 2013 14:26:10 -0700
exploitation ideas under memory pressure

Source: CCN
Type: SA53435
Microsoft Windows Kernel "win32k.sys" Privilege Escalation Vulnerability

Source: SECUNIA
Type: Vendor Advisory
53435

Source: MISC
Type: UNKNOWN
http://twitter.com/taviso/statuses/335557286657400832

Source: MISC
Type: UNKNOWN
http://www.computerworld.com/s/article/9239477

Source: EXPLOIT-DB
Type: UNKNOWN
25611

Source: CCN
Type: Microsoft Web site
Microsoft Windows

Source: OSVDB
Type: UNKNOWN
93539

Source: MISC
Type: UNKNOWN
http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/

Source: CCN
Type: BID-60159
Microsoft Windows Kernel 'Win32k.sys' CVE-2013-3661 Local Denial Of Service Vulnerability

Source: MISC
Type: UNKNOWN
http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw

Source: XF
Type: UNKNOWN
ms-win-cve20133661-dos(84571)

Source: CCN
Type: Packet Storm Security [06-03-2013]
Windows NT/2K/XP/2K3/VISTA/2K8/7/8 EPATHOBJ Local ring0

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [05-21-2013]

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [06-03-2013]

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x86:*
  • OR cpe:/o:microsoft:windows_8:-:*:*:*:pro_n:*:x64:*
  • OR cpe:/o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_rt:-:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_8:-:*:*:*:pro_n:*:x86:*
  • OR cpe:/o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x64:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows:server_2003:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:sp3:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:xp:sp2:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x64:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x86:*
  • OR cpe:/o:microsoft:windows_8:-:-:-:*:-:-:x64:*
  • OR cpe:/o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_rt:-:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_8:-:*:*:*:pro_n:*:x86:*

  • * Denotes that component is vulnerable
    BACK
    microsoft windows xp - sp2
    microsoft windows 7 - sp1
    microsoft windows 8 - -
    microsoft windows vista - sp2
    microsoft windows server 2008 - sp2
    microsoft windows rt -
    microsoft windows xp * sp3
    microsoft windows server 2003 * sp2
    microsoft windows 8 - -
    microsoft windows server 2012 -
    microsoft windows server 2008 r2 sp1
    microsoft windows 7 - sp1
    microsoft windows server_2003 sp2
    microsoft windows xp sp3
    microsoft windows vista - sp2
    microsoft windows server 2008 sp2
    microsoft windows xp sp2
    microsoft windows 7 - sp1
    microsoft windows server 2008 r2 sp1
    microsoft windows 7 - sp1
    microsoft windows 8 - -
    microsoft windows server 2012
    microsoft windows rt -
    microsoft windows 8 - -