CVE-2013-3661
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
24/05/2013
Last modified:
11/04/2025
Description
The EPATHOBJ::bFlatten function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not check whether linked-list traversal is continually accessing the same list member, which allows local users to cause a denial of service (infinite traversal) via vectors that trigger a crafted PATHRECORD chain.
Impact
Base Score 2.0
4.90
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0094.html
- http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0006.html
- http://secunia.com/advisories/53435
- http://twitter.com/taviso/statuses/335557286657400832
- http://www.computerworld.com/s/article/9239477
- http://www.exploit-db.com/exploits/25611/
- http://www.osvdb.org/93539
- http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/
- http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw
- http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0094.html
- http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0006.html
- http://secunia.com/advisories/53435
- http://twitter.com/taviso/statuses/335557286657400832
- http://www.computerworld.com/s/article/9239477
- http://www.exploit-db.com/exploits/25611/
- http://www.osvdb.org/93539
- http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/
- http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw