Vulnerability Name: | CVE-2018-0977 (CCN-140203) | ||||||||||||
Assigned: | 2017-12-01 | ||||||||||||
Published: | 2018-03-13 | ||||||||||||
Updated: | 2019-10-03 | ||||||||||||
Summary: | The Windows kernel mode driver in Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how objects are handled in memory, aka "Win32k Elevation of Privilege Vulnerability". | ||||||||||||
CVSS v3 Severity: | 7.0 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
6.3 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-0977 Source: BID Type: Third Party Advisory, VDB Entry 103380 Source: CCN Type: BID-103380 Microsoft Windows Kernel 'Win32k.sys' CVE-2018-0977 Local Privilege Escalation Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1040520 Source: XF Type: UNKNOWN ms-win32k-cve20180977-priv-esc(140203) Source: CCN Type: Microsoft Security TechCenter - March 2018 Win32k Elevation of Privilege Vulnerability Source: CONFIRM Type: Patch, Vendor Advisory https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0977 Source: CCN Type: ZDI-18-248 Microsoft Windows BasicRender Untrusted Pointer Dereference Privilege Escalation Vulnerability | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |