Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2017-0103 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Corporation Windows Registry
CWE-119 — Improper Restriction of Operations within the Bounds of a Memory Buffer10 documents5 sources
Severity
7.0HIGHNVD
EPSS
1.2%
top 21.17%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMar 17
Latest updateMay 17
Description
The kernel API in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows Server 2012 mishandles registry objects in memory, which allows local users to gain privileges via a crafted application, aka "Windows Registry Elevation of Privilege Vulnerability."
CVSS vector
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9
Affected Packages12 packages
▶CVEListV5microsoft_corporation/windows_registryThe kernel API in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows Server 2012
🔴Vulnerability Details
1GHSA▶
GHSA-7w5q-mhrq-jhm4: The kernel API in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows Server 2012 mishandles registry objects↗2022-05-17
💥Exploits & PoCs
1Exploit-DB▶
Microsoft Windows Kernel - Registry Hive Loading Crashes in nt!nt!HvpGetBinMemAlloc / nt!ExpFindAndRemoveTagBigPages (MS17-017)↗2017-03-20