CVE-2016-0175

low
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow local users to obtain sensitive information about kernel-object addresses, and consequently bypass the KASLR protection mechanism, via a crafted application, aka "Win32k Information Disclosure Vulnerability."

References

http://www.securityfocus.com/bid/90027

http://www.securitytracker.com/id/1035841

http://www.zerodayinitiative.com/advisories/ZDI-16-281

https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-062

Details

Source: MITRE

Published: 2016-05-11

Updated: 2018-10-12

Type: CWE-200

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

CVSS v3

Base Score: 3.3

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Impact Score: 1.4

Exploitability Score: 1.8

Severity: LOW

Tenable Plugins

View all (1 total)

IDNameProductFamilySeverity
91012MS16-062: Security Update for Windows Kernel-Mode Drivers (3158222)NessusWindows : Microsoft Bulletins
high