Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2015-2527 | First vendor Publication | 2015-09-08 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The process-initialization implementation in win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2527 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 2 |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-09-10 | IAVM : 2015-A-0212 - Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097) Severity : Category II - VMSKEY : V0061385 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-10-14 | Microsoft Windows Win32k.sys use after free attempt RuleID : 36029 - Revision : 3 - Type : OS-WINDOWS |
2015-10-14 | Microsoft Windows Win32k.sys use after free attempt RuleID : 36028 - Revision : 3 - Type : OS-WINDOWS |
2015-10-14 | Microsoft Windows use after free kernel privilege escalation attempt RuleID : 36017 - Revision : 3 - Type : OS-WINDOWS |
2015-10-14 | Microsoft Windows use after free kernel privilege escalation attempt RuleID : 36016 - Revision : 3 - Type : OS-WINDOWS |
2015-10-14 | Microsoft Windows desktop window privilege escalation attempt RuleID : 35995 - Revision : 3 - Type : OS-WINDOWS |
2015-10-14 | Microsoft Windows desktop window privilege escalation attempt RuleID : 35994 - Revision : 3 - Type : OS-WINDOWS |
2015-10-14 | NtGdiStretchBlt buffer overflow privilege escalation attempt RuleID : 35989 - Revision : 3 - Type : FILE-EXECUTABLE |
2015-10-14 | NtGdiStretchBlt buffer overflow privilege escalation attempt RuleID : 35988 - Revision : 3 - Type : FILE-EXECUTABLE |
2015-10-14 | Microsoft Windows NtUserSetWindowsHook memory disclosure attempt RuleID : 35987 - Revision : 3 - Type : OS-WINDOWS |
2015-10-14 | Microsoft Windows NtUserSetWindowsHook memory disclosure attempt RuleID : 35986 - Revision : 3 - Type : OS-WINDOWS |
2015-10-14 | Microsoft Windows GDI+ denial of service attempt RuleID : 35985 - Revision : 2 - Type : OS-WINDOWS |
2015-10-14 | Microsoft Windows GDI+ denial of service attempt RuleID : 35984 - Revision : 2 - Type : OS-WINDOWS |
2015-10-06 | Microsoft Windows SURFACE objects kernel privilege escalation attempt RuleID : 35974 - Revision : 2 - Type : OS-WINDOWS |
2015-10-06 | Microsoft Windows SURFACE objects kernel privilege escalation attempt RuleID : 35973 - Revision : 2 - Type : OS-WINDOWS |
2015-08-25 | Microsoft Windows CDD font parsing kernel memory corruption attempt RuleID : 35720 - Revision : 4 - Type : OS-WINDOWS |
2015-08-25 | Microsoft Windows CDD font parsing kernel memory corruption attempt RuleID : 35719 - Revision : 3 - Type : OS-WINDOWS |
2015-04-14 | Microsoft Windows NtUserGetClipboardAccessToken privilege escalation attempt RuleID : 33766 - Revision : 4 - Type : OS-WINDOWS |
2015-04-14 | Microsoft Windows NtUserGetClipboardAccessToken privilege escalation attempt RuleID : 33765 - Revision : 4 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-09-09 | Name : The remote host is affected by multiple vulnerabilities. File : smb_nt_ms15-097.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:46:20 |
|
2024-08-02 12:32:25 |
|
2024-08-02 01:09:38 |
|
2024-02-02 01:31:27 |
|
2024-02-01 12:09:14 |
|
2023-09-05 12:29:53 |
|
2023-09-05 01:09:05 |
|
2023-09-02 12:29:50 |
|
2023-09-02 01:09:15 |
|
2023-08-12 12:32:34 |
|
2023-08-12 01:08:43 |
|
2023-08-11 12:27:55 |
|
2023-08-11 01:08:58 |
|
2023-08-06 12:27:07 |
|
2023-08-06 01:08:43 |
|
2023-08-04 12:27:12 |
|
2023-08-04 01:08:47 |
|
2023-07-14 12:27:12 |
|
2023-07-14 01:08:44 |
|
2023-03-29 01:28:57 |
|
2023-03-28 12:09:05 |
|
2022-12-03 12:22:20 |
|
2021-05-04 12:38:57 |
|
2021-04-22 01:47:43 |
|
2020-05-23 00:44:46 |
|
2019-05-15 05:19:09 |
|
2019-05-09 05:19:09 |
|
2018-10-13 05:18:56 |
|
2017-09-16 09:23:17 |
|
2016-12-22 09:23:55 |
|
2016-11-29 00:25:08 |
|
2016-04-27 02:14:53 |
|
2015-10-18 17:24:20 |
|
2015-09-11 21:25:40 |
|
2015-09-10 21:27:08 |
|
2015-09-10 13:26:29 |
|
2015-09-10 00:24:53 |
|
2015-09-09 21:26:36 |
|
2015-09-09 09:25:06 |
|