First published: Thu Jun 15 2017(Updated: )
Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to elevate privilege when tdx.sys fails to check the length of a buffer prior to copying memory to it, aka "Windows TDX Elevation of Privilege Vulnerability".
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1511 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1703 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows 8.1 | =rt | |
Microsoft Windows Server 2008 Itanium | =r2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0296 has a critical severity rating as it allows an attacker to elevate privileges.
To fix CVE-2017-0296, users should apply the latest security updates provided by Microsoft for their affected Windows systems.
CVE-2017-0296 affects multiple Microsoft Windows versions including Windows 7 SP1, Windows 8.1, Windows 10, and Windows Server versions.
CVE-2017-0296 is a privilege escalation vulnerability caused by improper handling of buffer lengths in the tdx.sys system driver.
CVE-2017-0296 requires local access to the system to exploit, so it cannot be directly exploited remotely.