Microsoft Windows Kernel 'Win32k.sys' CVE-2016-7255 Local Privilege Escalation Vulnerability



Microsoft Windows is prone to a local privilege-escalation vulnerability that occurs in the Windows kernel.

A local attacker can exploit this issue to execute arbitrary code in kernel mode with elevated privileges.

Information

Bugtraq ID: 94064
Class: Unknown
CVE: CVE-2016-7255

Remote: No
Local: Yes
Published: Nov 08 2016 12:00AM
Updated: Jul 13 2017 05:06PM
Credit: Neel Mehta and Billy Leonard of Googleâ??s Threat Analysis Group Feike Hacquebord, Peter Pi and Brooks Li of Trend Micro
Vulnerable: Microsoft Windows Vista x64 Edition Service Pack 2 0
Microsoft Windows Vista SP2
Microsoft Windows Server 2016 for x64-based Systems 0
Microsoft Windows Server 2012 R2 0
Microsoft Windows Server 2012 0
Microsoft Windows Server 2008 R2 for x64-based Systems SP1
Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1
Microsoft Windows Server 2008 for x64-based Systems SP2
Microsoft Windows Server 2008 for Itanium-based Systems SP2
Microsoft Windows Server 2008 for 32-bit Systems SP2
Microsoft Windows RT 8.1
Microsoft Windows 8.1 for x64-based Systems 0
Microsoft Windows 8.1 for 32-bit Systems 0
Microsoft Windows 7 for x64-based Systems SP1
Microsoft Windows 7 for 32-bit Systems SP1
Microsoft Windows 10 Version 1607 for x64-based Systems 0
Microsoft Windows 10 Version 1607 for 32-bit Systems 0
Microsoft Windows 10 version 1511 for x64-based Systems 0
Microsoft Windows 10 version 1511 for 32-bit Systems 0
Microsoft Windows 10 for x64-based Systems 0
Microsoft Windows 10 for 32-bit Systems 0


Not Vulnerable:

Exploit


Reports indicate that this issue is being exploited in the wild.

This vulnerability is being exploited as part of the cyber espionage campaign identified in Symantec MATI report SYMC - 300532.
The following exploit code is available:


Related Posts