The kernel-mode drivers in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1 and Windows Server 2012 Gold allow a local authenticated attacker to execute a specially crafted application to obtain kernel information, aka "Win32k Information Disclosure Vulnerability."
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/42008/ | exploit |
http://www.securityfocus.com/bid/98115 | vdb entry third party advisory |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0245 | patch vendor advisory |