Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2015-2381 | First vendor Publication | 2015-07-14 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 2.1 | Attack Range | Local |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information from kernel memory via a crafted application, aka "Win32k Information Disclosure Vulnerability," a different vulnerability than CVE-2015-2382. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2381 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-200 | Information Exposure |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:29388 | |||
Oval ID: | oval:org.mitre.oval:def:29388 | ||
Title: | Win32k information disclosure vulnerability - CVE-2015-2381 (MS15-073) | ||
Description: | win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information from kernel memory via a crafted application, aka "Win32k Information Disclosure Vulnerability," a different vulnerability than CVE-2015-2382. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2015-2381 | Version: | 3 |
Platform(s): | Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 4 |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-07-16 | IAVM : 2015-A-0162 - Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-073) Severity : Category II - VMSKEY : V0061097 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-08-14 | Microsoft Windows desktop reference use after free attempt RuleID : 35150 - Revision : 4 - Type : OS-WINDOWS |
2015-08-14 | Microsoft Windows desktop reference use after free attempt RuleID : 35149 - Revision : 4 - Type : OS-WINDOWS |
2015-08-14 | Microsoft Windows DeferWindowPos access after release code injection attempt RuleID : 35136 - Revision : 3 - Type : OS-WINDOWS |
2015-08-14 | Microsoft Windows DeferWindowPos access after release code injection attempt RuleID : 35135 - Revision : 3 - Type : OS-WINDOWS |
2015-08-14 | Microsoft Windows NtUserDisableProcessWindowFiltering information disclosure ... RuleID : 35132 - Revision : 3 - Type : OS-WINDOWS |
2015-08-14 | Microsoft Windows NtUserDisableProcessWindowFiltering information disclosure ... RuleID : 35131 - Revision : 3 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-07-14 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms15-073.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 12:46:19 |
|
2021-05-04 12:38:56 |
|
2021-04-22 01:47:42 |
|
2020-05-23 00:44:44 |
|
2019-05-09 05:19:08 |
|
2018-10-13 05:18:54 |
|
2017-09-22 09:24:11 |
|
2016-04-27 02:14:02 |
|
2015-10-18 17:23:57 |
|
2015-07-22 05:30:34 |
|
2015-07-18 13:28:43 |
|
2015-07-16 09:30:03 |
|
2015-07-15 21:23:34 |
|
2015-07-15 05:27:34 |
|