CVE-2018-0750
CVSS2.1
发布时间 :2018-01-04 09:29:00
修订时间 :2018-01-12 15:02:29
NMS    

[原文]The Windows GDI component in Windows 7 SP1 and Windows Server 2008 SP2 and R2 SP1 allows an information disclosure vulnerability due to the way objects are handled in memory, aka "Windows Elevation of Privilege Vulnerability".


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-200 [信息暴露]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_7:-:sp1
cpe:/o:microsoft:windows_server_2008:-:sp2Microsoft Windows Server 2008 Service Pack 2
cpe:/o:microsoft:windows_server_2008:r2:sp1Microsoft Windows Server 2008 R2 Service Pack 1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0750
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0750
(官方数据源) NVD

- 其它链接及资源

http://www.securityfocus.com/bid/102357
(VENDOR_ADVISORY)  BID  102357
http://www.securitytracker.com/id/1040091
(VENDOR_ADVISORY)  SECTRACK  1040091
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0750
(VENDOR_ADVISORY)  CONFIRM  https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0750

- 漏洞信息

Microsoft Windows GDI Component CVE-2018-0750 Local Information Disclosure Vulnerability
Design Error 102357
No Yes
2018-01-03 12:00:00 2018-01-03 12:00:00
Seonung Jang(@seonunghardt)

- 受影响的程序版本

Microsoft Windows Server 2008 R2 for x64-based Systems SP1
Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1
Microsoft Windows Server 2008 for x64-based Systems SP2
Microsoft Windows Server 2008 for Itanium-based Systems SP2
Microsoft Windows Server 2008 for 32-bit Systems SP2
Microsoft Windows 7 for x64-based Systems SP1
Microsoft Windows 7 for 32-bit Systems SP1

- 漏洞讨论

Microsoft Windows is prone to a local information-disclosure vulnerability.

A local attacker can leverage this issue to disclose sensitive information that may aid in further attacks.

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Updates are available. Please see the references or vendor advisory for more information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站