漏洞标题
Windows GDI权限提升漏洞
漏洞描述信息
在Windows图形设备接口(GDI)处理内存中的对象方式中存在一个权限提升漏洞。成功利用此漏洞的攻击者可以在内核模式下运行任意代码。攻击者随后可以安装程序;查看、更改或删除数据;或者创建具有完全用户权限的新帐户。
要利用此漏洞,攻击者首先需要登录系统。然后,攻击者可以运行一个特制的应用程序,该程序可以利用此漏洞并控制受影响的系统。
更新通过纠正GDI处理内存中对象的方式并防止意外的用户模式权限提升,解决了此漏洞。
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
Windows GDI Elevation of Privilege Vulnerability
漏洞描述信息
An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
The update addresses the vulnerability by correcting how GDI handles objects in memory and by preventing instances of unintended user-mode privilege elevation.
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
Microsoft Windows Windows Graphics Device Interface 安全漏洞
漏洞描述信息
Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。Windows Graphics Device Interface(GDI)是其中的一个图形设备接口。 Microsoft Windows GDI中处理内存对象的方法存在提权漏洞。攻击者可通过登录到系统并运行特制的应用程序利用该漏洞在内核模式中运
CVSS信息
N/A
漏洞类别
其他