First published: Wed Nov 11 2015(Updated: )
The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to bypass the KASLR protection mechanism, and consequently discover a driver base address, via a crafted application, aka "Windows Kernel Memory Information Disclosure Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1511 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6102 has a critical severity rating as it allows local users to bypass security mechanisms.
To fix CVE-2015-6102, apply the latest security updates provided by Microsoft for the affected Windows versions.
CVE-2015-6102 affects Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012, Windows RT, and Windows 10.
CVE-2015-6102 is a vulnerability related to the KASLR protection mechanism in the Windows kernel.
CVE-2015-6102 requires local access to the affected system for exploitation, which limits its risk compared to remote exploit vulnerabilities.