CVE-2013-3660 (CNNVD-201305-540)
中文标题:
Microsoft Windows win32k.sys ‘EPATHOBJ::pprFlattenRec’函数拒绝服务漏洞
英文标题:
The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows X...
漏洞描述
中文描述:
Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。 Microsoft Windows XP SP2和SP3,Windows Server 2003 SP2,Windows Vista SP2,Windows Server 2008 SP2和R2 SP1,Windows 7 SP1,Windows 8,Windows Server 2012,Windows RT中的win32k.sys中的‘EPATHOBJ::pprFlattenRec’函数中存在漏洞,该漏洞源于程序对特定列表中的下个对象没有正确初始化指针。本地攻击者可通过触发消耗大量的页面内存,并使用许多FlattenPath函数调用利用该漏洞获得对PATHRECORD链的写入访问权限,进而获得特权。
英文描述:
The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the PATHRECORD chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many FlattenPath function calls, aka "Win32k Read AV Vulnerability."
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| microsoft | windows_7 | - | - | - |
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
|
| microsoft | windows_8 | - | - | - |
cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*
|
| microsoft | windows_rt | - | - | - |
cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*
|
| microsoft | windows_server_2003 | - | - | - |
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
|
| microsoft | windows_server_2008 | - | - | - |
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
|
| microsoft | windows_server_2008 | r2 | - | - |
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
|
| microsoft | windows_server_2012 | - | - | - |
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
|
| microsoft | windows_vista | - | - | - |
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
|
| microsoft | windows_xp | - | - | - |
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
nvd.nist.gov
exploitdb
exploitdb
cve.org
cve.org
cve.org
exploitdb
exploitdb
exploitdb
exploitdb
CVSS评分详情
3.1 (adp)
HIGHCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2013-3660 |
2025-11-11 15:18:37 | 2025-11-11 07:33:36 |
| NVD | nvd_CVE-2013-3660 |
2025-11-11 14:54:14 | 2025-11-11 07:42:23 |
| CNNVD | cnnvd_CNNVD-201305-540 |
2025-11-11 15:09:21 | 2025-11-11 07:50:44 |
| EXPLOITDB | exploitdb_EDB-25611 |
2025-11-11 15:05:50 | 2025-11-11 08:22:00 |
| EXPLOITDB | exploitdb_EDB-25912 |
2025-11-11 15:05:53 | 2025-11-11 08:22:23 |
| EXPLOITDB | exploitdb_EDB-26554 |
2025-11-11 15:05:53 | 2025-11-11 08:23:08 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 22 -> 24
- tags_count: 5 -> 6
查看详细变更
- references_count: 20 -> 22
- tags_count: 4 -> 5
查看详细变更
- references_count: 15 -> 20
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-201305-540
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 0 -> 9
- references_count: 14 -> 15
- data_sources: ['cve'] -> ['cve', 'nvd']