Buffer overflow in Windows and Windows Server - CVE-2017-0296
Published: June 13, 2017 / Updated: June 14, 2017
Vulnerability identifier: #VU7037
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-0296
CWE-ID: CWE-120
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Microsoft
Affected software:
Windows
Windows Server
Windows
Windows Server
Detailed vulnerability description
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to boundary error when checking the length of a buffer by tdx.sys. A local attacker can run a specially crafted application to gain system privileges and run processes in an elevated context.
Successful exploitation of the vulnerability results privilege escalation.
The weakness exists due to boundary error when checking the length of a buffer by tdx.sys. A local attacker can run a specially crafted application to gain system privileges and run processes in an elevated context.
Successful exploitation of the vulnerability results privilege escalation.
How to mitigate CVE-2017-0296
Install update from vendor's website.