First published: Tue Apr 21 2015(Updated: )
An unspecified vulnerability exists in the Win32k.sys kernel-mode driver in Microsoft Windows Server that allows a local attacker to execute arbitrary code with elevated privileges.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server 2003 | =r2-sp2 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows 7 | <=- | |
Microsoft Windows 7 | <=- | |
Microsoft Win32 Kernel Subsystem |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1701 is considered a high-severity vulnerability that allows local attackers to execute arbitrary code with elevated privileges.
To mitigate CVE-2015-1701, it is recommended to apply the latest security updates provided by Microsoft for the affected operating systems.
CVE-2015-1701 affects Microsoft Windows Server 2003 SP2, Windows Vista SP2, and Windows Server 2008 SP2.
The attack vector for CVE-2015-1701 is local, meaning that an attacker must have local access to the affected system to exploit the vulnerability.
No, CVE-2015-1701 requires local access to exploit, so it cannot be exploited remotely without physical access to the system.