CVE-2015-1701

Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:r2:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*

History

26 Mar 2025, 19:50

Type Values Removed Values Added
References () http://twitter.com/symantec/statuses/590208710527549440 - Broken Link () http://twitter.com/symantec/statuses/590208710527549440 - Press/Media Coverage

21 Nov 2024, 02:25

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2020/May/34 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/May/34 - Mailing List, Third Party Advisory
References () http://twitter.com/symantec/statuses/590208710527549440 - Broken Link () http://twitter.com/symantec/statuses/590208710527549440 - Broken Link
References () http://www.securityfocus.com/bid/74245 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/74245 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1032155 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1032155 - Broken Link, Third Party Advisory, VDB Entry
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051 - Patch, Vendor Advisory () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051 - Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/37049/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/37049/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/37367/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/37367/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html - Third Party Advisory () https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html - Third Party Advisory

16 Jul 2024, 17:34

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2020/May/34 - () http://seclists.org/fulldisclosure/2020/May/34 - Mailing List, Third Party Advisory
References () http://twitter.com/symantec/statuses/590208710527549440 - () http://twitter.com/symantec/statuses/590208710527549440 - Broken Link
References () http://www.securityfocus.com/bid/74245 - () http://www.securityfocus.com/bid/74245 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1032155 - () http://www.securitytracker.com/id/1032155 - Broken Link, Third Party Advisory, VDB Entry
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051 - Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/37049/ - () https://www.exploit-db.com/exploits/37049/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/37367/ - () https://www.exploit-db.com/exploits/37367/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html - () https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html - Third Party Advisory
CPE cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:r2:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*
CVSS v2 : 7.2
v3 : unknown
v2 : 7.2
v3 : 7.8
CWE CWE-264 NVD-CWE-noinfo

Information

Published : 2015-04-21 10:59

Updated : 2025-04-12 10:46


NVD link : CVE-2015-1701

Mitre link : CVE-2015-1701

CVE.ORG link : CVE-2015-1701


JSON object : View

Products Affected

microsoft

  • windows_server_2008
  • windows_2003_server
  • windows_vista
  • windows_7