The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2518, and CVE-2015-2546.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 6.9 | MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
| Hyperlink | Source | Resource |
|---|---|---|
| http://www.securityfocus.com/bid/76606 | secure@microsoft.com | Third Party Advisory VDB Entry |
| http://www.securitytracker.com/id/1033485 | secure@microsoft.com | Third Party Advisory VDB Entry |
| https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097 | secure@microsoft.com | Patch Vendor Advisory |
| https://www.exploit-db.com/exploits/38278/ | secure@microsoft.com | Third Party Advisory VDB Entry |
| http://www.securityfocus.com/bid/76606 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
| http://www.securitytracker.com/id/1033485 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
| https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097 | af854a3a-2127-422b-91ae-364da2661108 | Patch Vendor Advisory |
| https://www.exploit-db.com/exploits/38278/ | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |