Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-8684Sensitive Information Exposure in Corporation Windows GDI

Severity
5.5MEDIUMNVD
EPSS
26.9%
top 3.63%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 13
Latest updateMay 17

Description

Windows GDI+ on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT 8.1, allows information disclosure by the way it discloses kernel memory addresses, aka "Windows GDI+ Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8685 and CVE-2017-8688.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Patches

🔴Vulnerability Details

4
GHSA
GHSA-h298-mq6p-crvr: Windows GDI+ on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 82022-05-17
GHSA
GHSA-m6q3-2qv4-4mgx: Windows GDI+ on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 82022-05-14
GHSA
GHSA-p283-vv7w-w6hx: Windows GDI+ on Microsoft Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows information disclosure by the way it discloses kernel memory ad2022-05-14
Project0
Using Binary Diffing to Discover Windows Kernel Memory Disclosure Bugs - Project Zero2017-10-01

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows Kernel - 'win32k!NtGdiGetFontResourceInfoInternalW' Stack Memory Disclosure2017-09-18

📋Vendor Advisories

1
Microsoft
Windows GDI+ Information Disclosure Vulnerability2017-09-12

🕵️Threat Intelligence

1
Talos
Microsoft Patch Tuesday - September 20172017-09-12
CVE-2017-8684 — Sensitive Information Exposure | cvebase