First published: Wed Nov 11 2015(Updated: )
The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to bypass intended filesystem permissions by leveraging Low Integrity access, aka "Windows Kernel Security Feature Bypass Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1511 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6113 is rated as important in severity due to its ability to allow local users to bypass filesystem permissions.
To fix CVE-2015-6113, install the security updates provided by Microsoft for the affected versions of Windows.
CVE-2015-6113 affects several versions including Windows Vista SP2, Windows 7 SP1, Windows 8, Windows 8.1, Windows 10, and Windows Server editions.
CVE-2015-6113 is a local privilege escalation vulnerability that allows users to bypass intended filesystem permissions.
CVE-2015-6113 cannot be exploited remotely as it requires local user access to the affected systems.