The kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly manage a window class, which allows local users to gain privileges by creating a window, then using (1) the SetWindowLongPtr function to modify the popup menu structure, or (2) the SwitchWndProc function with a switch window information pointer, which is not re-initialized when a WM_NCCREATE message is processed, aka Win32k Window Class Vulnerability.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Windows_2003_server | Microsoft | * | * |
Windows_7 | Microsoft | * | * |
Windows_7 | Microsoft | - (including) | - (including) |
Windows_server_2003 | Microsoft | * | * |
Windows_server_2008 | Microsoft | * | * |
Windows_server_2008 | Microsoft | –sp2 (including) | –sp2 (including) |
Windows_vista | Microsoft | * | * |
Windows_vista | Microsoft | –sp1 (including) | –sp1 (including) |
Windows_xp | Microsoft | * | * |
Windows_xp | Microsoft | –sp2 (including) | –sp2 (including) |