关于 CVE-2015-0094 的漏洞信息

1. 漏洞描述
From NVD
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly restrict the availability of address information during a function call, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability."
From 神龙GPT (AIGC)
微软Windows Server 2003 SP2、Windows Vista SP2、Windows Server 2008 SP2和R2 SP1、Windows 7 SP1、Windows 8、Windows 8.1、Windows Server 2012 Gold和R2、Windows RT Gold和8.1的内核驱动程序在函数调用期间未能正确限制地址信息可用性,这使本地用户更容易通过编写应用程序绕过地址随机化保护机制,aka "Microsoft Windows Kernel Memory Disclosure Vulnerability"。
2. 漏洞评分(CVSS)
From NVD
NVD 暂无评分
From 神龙GPT (AIGC)
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
3. 漏洞类别
From NVD
NVD 暂无漏洞类别信息
From 神龙GPT (AIGC)
神龙GPT 暂无漏洞类别信息(请耐心等待)
Reference