Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2013-3660
PUBLISHED
Known KEV
More InfoOfficial Page
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
View Known Exploited Vulnerability (KEV) details
Published At-24 May, 2013 | 20:00
Updated At-30 Jul, 2025 | 01:46
Rejected At-
▼CVE Numbering Authority (CNA)

The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the PATHRECORD chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many FlattenPath function calls, aka "Win32k Read AV Vulnerability."

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0094.html
mailing-list
x_refsource_FULLDISC
http://www.exploit-db.com/exploits/25611/
exploit
x_refsource_EXPLOIT-DB
http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0090.html
mailing-list
x_refsource_FULLDISC
http://secunia.com/advisories/53435
third-party-advisory
x_refsource_SECUNIA
http://www.osvdb.org/93539
vdb-entry
x_refsource_OSVDB
http://twitter.com/taviso/statuses/309157606247768064
x_refsource_MISC
http://www.computerworld.com/s/article/9239477
x_refsource_MISC
http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw
x_refsource_MISC
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17360
vdb-entry
signature
x_refsource_OVAL
http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/
x_refsource_MISC
http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0006.html
mailing-list
x_refsource_FULLDISC
http://www.us-cert.gov/ncas/alerts/TA13-190A
third-party-advisory
x_refsource_CERT
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053
vendor-advisory
x_refsource_MS
http://twitter.com/taviso/statuses/335557286657400832
x_refsource_MISC
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0094.html
mailing-list
x_refsource_FULLDISC
x_transferred
http://www.exploit-db.com/exploits/25611/
exploit
x_refsource_EXPLOIT-DB
x_transferred
http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0090.html
mailing-list
x_refsource_FULLDISC
x_transferred
http://secunia.com/advisories/53435
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.osvdb.org/93539
vdb-entry
x_refsource_OSVDB
x_transferred
http://twitter.com/taviso/statuses/309157606247768064
x_refsource_MISC
x_transferred
http://www.computerworld.com/s/article/9239477
x_refsource_MISC
x_transferred
http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw
x_refsource_MISC
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17360
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/
x_refsource_MISC
x_transferred
http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0006.html
mailing-list
x_refsource_FULLDISC
x_transferred
http://www.us-cert.gov/ncas/alerts/TA13-190A
third-party-advisory
x_refsource_CERT
x_transferred
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053
vendor-advisory
x_refsource_MS
x_transferred
http://twitter.com/taviso/statuses/335557286657400832
x_refsource_MISC
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-119CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Metrics Other Info
kev
dateAdded:
2022-03-28
reference:
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-3660
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
CVE-2013-3660 added to CISA KEV2022-03-28 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found