First published: Thu Nov 10 2016(Updated: )
The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to bypass the ASLR protection mechanism via a crafted application, aka "Win32k Information Disclosure Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | ||
Windows 10 | =1511 | |
Windows 10 | =1607 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7214 has a high severity rating due to its potential to allow local users to bypass security mechanisms.
To mitigate CVE-2016-7214, apply the security updates provided by Microsoft for the affected versions of Windows.
CVE-2016-7214 affects Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8.1, Windows 10 and several Windows Server versions.
Exploitation of CVE-2016-7214 may allow attackers to execute arbitrary code with elevated privileges.
There are no known reliable workarounds for CVE-2016-7214; applying the relevant updates is essential.