Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."
Link | Tags |
---|---|
http://twitter.com/symantec/statuses/590208710527549440 | press/media coverage |
https://www.exploit-db.com/exploits/37049/ | exploit vdb entry third party advisory |
http://www.securityfocus.com/bid/74245 | vdb entry third party advisory broken link |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051 | patch vendor advisory |
https://www.exploit-db.com/exploits/37367/ | exploit vdb entry third party advisory |
https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html | third party advisory |
http://www.securitytracker.com/id/1032155 | vdb entry third party advisory broken link |
http://seclists.org/fulldisclosure/2020/May/34 | third party advisory mailing list |