First published: Wed Jan 13 2016(Updated: )
The graphics device interface in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "Windows GDI32.dll ASLR Bypass Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0008 has a severity rating that indicates it can allow an attacker to bypass ASLR protections, compromising system security.
To fix CVE-2016-0008, apply the latest Microsoft security updates and patches designated for your operating system.
CVE-2016-0008 affects Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012, and Windows RT.
Yes, CVE-2016-0008 can potentially be exploited remotely by attackers if systems are not properly patched.
ASLR stands for Address Space Layout Randomization, a security feature that is bypassed by CVE-2016-0008, allowing for easier exploitation.