The kernel-mode drivers in Transaction Manager in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Windows Elevation of Privilege Vulnerability."
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/bid/96625 | Broken Link Third Party Advisory VDB Entry |
| http://www.securitytracker.com/id/1038013 | Broken Link Third Party Advisory VDB Entry |
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0101 | Patch Vendor Advisory |
| https://www.exploit-db.com/exploits/44479/ | Exploit Third Party Advisory VDB Entry |
| http://www.securityfocus.com/bid/96625 | Broken Link Third Party Advisory VDB Entry |
| http://www.securitytracker.com/id/1038013 | Broken Link Third Party Advisory VDB Entry |
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0101 | Patch Vendor Advisory |
| https://www.exploit-db.com/exploits/44479/ | Exploit Third Party Advisory VDB Entry |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-0101 |
Configurations
Configuration 1 (hide)
|
History
22 Oct 2025, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 03:02
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.securityfocus.com/bid/96625 - Broken Link, Third Party Advisory, VDB Entry | |
| References | () http://www.securitytracker.com/id/1038013 - Broken Link, Third Party Advisory, VDB Entry | |
| References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0101 - Patch, Vendor Advisory | |
| References | () https://www.exploit-db.com/exploits/44479/ - Exploit, Third Party Advisory, VDB Entry |
16 Jul 2024, 17:46
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:* |
|
| References | () http://www.securityfocus.com/bid/96625 - Broken Link, Third Party Advisory, VDB Entry | |
| References | () http://www.securitytracker.com/id/1038013 - Broken Link, Third Party Advisory, VDB Entry | |
| References | () https://www.exploit-db.com/exploits/44479/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2017-03-17 00:59
Updated : 2025-10-22 00:15
NVD link : CVE-2017-0101
Mitre link : CVE-2017-0101
CVE.ORG link : CVE-2017-0101
JSON object : View
Products Affected
microsoft
- windows_7
- windows_vista
- windows_server_2008
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
