Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2013-3661
PUBLISHED
More InfoOfficial Page
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
View Known Exploited Vulnerability (KEV) details
Published At-24 May, 2013 | 20:00
Updated At-06 Aug, 2024 | 16:14
Rejected At-
▼CVE Numbering Authority (CNA)

The EPATHOBJ::bFlatten function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not check whether linked-list traversal is continually accessing the same list member, which allows local users to cause a denial of service (infinite traversal) via vectors that trigger a crafted PATHRECORD chain.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0094.html
mailing-list
x_refsource_FULLDISC
http://www.exploit-db.com/exploits/25611/
exploit
x_refsource_EXPLOIT-DB
http://secunia.com/advisories/53435
third-party-advisory
x_refsource_SECUNIA
http://www.osvdb.org/93539
vdb-entry
x_refsource_OSVDB
http://www.computerworld.com/s/article/9239477
x_refsource_MISC
http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw
x_refsource_MISC
http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/
x_refsource_MISC
http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0006.html
mailing-list
x_refsource_FULLDISC
http://twitter.com/taviso/statuses/335557286657400832
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0094.html
mailing-list
x_refsource_FULLDISC
x_transferred
http://www.exploit-db.com/exploits/25611/
exploit
x_refsource_EXPLOIT-DB
x_transferred
http://secunia.com/advisories/53435
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.osvdb.org/93539
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.computerworld.com/s/article/9239477
x_refsource_MISC
x_transferred
http://www.theverge.com/2013/5/23/4358400/google-engineer-bashes-microsoft-discloses-windows-flaw
x_refsource_MISC
x_transferred
http://www.reddit.com/r/netsec/comments/1eqh66/0day_windows_kernel_epathobj_vulnerability/
x_refsource_MISC
x_transferred
http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0006.html
mailing-list
x_refsource_FULLDISC
x_transferred
http://twitter.com/taviso/statuses/335557286657400832
x_refsource_MISC
x_transferred
Details not found