Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
Product | CPU Architecture | Version | Update | Tested |
---|---|---|---|---|
Windows Vista | SP1 | |||
Windows Vista | SP2 | |||
Windows Xp | SP2 | |||
Windows Xp | SP3 | |||
Windows 7 | ||||
Windows 7 | x86/x64 | SP1 | ||
Windows Server 2003 | SP2 | |||
Windows Server 2008 | R2 | |||
Windows Server 2008 | SP2 |
该漏洞并未进行测试,根目录留存着网络收集**[CVE编号].zip**的EXP或者POC,代码状态未知