The kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via a crafted application, aka "Win32k Null Pointer Dereference Vulnerability."
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1032525 | third party advisory vdb entry |
https://www.exploit-db.com/exploits/38274/ | third party advisory vdb entry exploit |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-061 | patch vendor advisory |