First published: Fri May 24 2013(Updated: )
The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the PATHRECORD chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many FlattenPath function calls, aka "Win32k Read AV Vulnerability."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Win32k | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
=sp1 | ||
=sp2 | ||
=sp2 | ||
=r2-sp1 | ||
=sp2 | ||
=sp2 | ||
=sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3660 has a critical severity rating due to its potential to allow arbitrary code execution.
To fix CVE-2013-3660, apply the relevant security updates released by Microsoft for the affected versions of Windows.
CVE-2013-3660 affects Windows XP SP2 and SP3, Windows Vista SP2, Windows 7 SP1, Windows 8, and various Server editions.
The potential impacts of CVE-2013-3660 include system compromise and unauthorized access due to remote code execution.
There are no reliable workarounds for CVE-2013-3660, so applying the appropriate patches is essential.