Research > Zero-Day Tracker > 20130515
Windows Kernel Privilege Elevation Vulnerability
Windows NT, 2000, XP, 2003, Vista, 2008, 7, 8
An elevation of privilege vulnerability exists within the Windows kernel. Within win32k!EPATHOBJ::pprFlattenRec, win32k!EPATHOBJ::newpathrec returns a PATHREC object that does not properly initialize the next list pointer. A successful exploit, granting full system privileges, has been publicly released.
Yes. Elevation of privileges to execute code in the kernel.
Local Elevation of Privilege
Local attackers exploiting this vulnerability will be able to elevate their privileges to the context of the kernel. Attackers will likely leverage this to hide their presence on the compromised system.
No mitigation is currently available.
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
19217 - Windows Kernel Privilege Elevation Vulnerability (Zero-Day)
2013-05-15: Original disclosure
2013-05-20: Information released stating that exploitation is possible
2013-06-03: Public exploit released
2013-07-09: Vendor patch released
Copyright ©1998-2011 eEye Digital Security
Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of eEye. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please email alert@eEye.com for permission.
The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are no warranties, implied or express, with regard to this information. In no event shall the author be liable for any direct or indirect damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.