Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."
Product | CPU Architecture | Version | Update | Tested |
---|---|---|---|---|
Windows Server 2003 | SP2 | |||
Windows 7 | SP1 | ✔ | ||
Windows Server 2008 | SP2 | ✔ | ||
Windows Vista | SP2 |
CompilerEnvironment
- VS2019 (V140)X64 Release
- VS2019 (V140)X86 Release
X86 utilization
Test Machine Windows 7 SP1 x86
x64 utilization
Test Machine Windows Server 2008 R2 SP1 x64