Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-8683Improper Input Validation in Corporation Windows Graphics

Severity
8.8HIGHNVD
NVD5.5
EPSS
18.2%
top 4.80%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 13
Latest updateMay 14

Description

Windows graphics on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an attacker to execute remote code by the way it handles embedded fonts, aka "Win32k Graphics Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8682.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Patches

🔴Vulnerability Details

2
GHSA
GHSA-h72p-r49x-6h8h: Windows graphics on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 82022-05-14
GHSA
GHSA-qpcp-w8gx-g3rh: Windows graphics on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 82022-05-14

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows Kernel - 'win32k.sys' '.TTF' Font Processing Out-of-Bounds Read with Malformed 'glyf' Table 'win32k!fsc_CalcGrayRow' (Denial of Service)2017-09-18

📋Vendor Advisories

1
Microsoft
Microsoft Graphics Component Information Disclosure Vulnerability2017-09-12

🕵️Threat Intelligence

1
Talos
Microsoft Patch Tuesday - September 20172017-09-12