CVE-2023-35313Use After Free in Microsoft Windows 10 Version 1507

CWE-416Use After Free3 documents3 sources
Severity
7.8HIGHNVD
EPSS
0.6%
top 31.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11

Description

Windows Online Certificate Status Protocol (OCSP) SnapIn Remote Code Execution Vulnerability

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages27 packages

NVDmicrosoft/windows_10_1507< 10.0.10240.20048
NVDmicrosoft/windows_10_1607< 10.0.14393.6085
NVDmicrosoft/windows_10_1809< 10.0.17763.4645
NVDmicrosoft/windows_10_21h2< 10.0.19041.3208
NVDmicrosoft/windows_10_22h2< 10.0.19045.3208

Patches

🔴Vulnerability Details

1
GHSA
GHSA-mf75-mpj2-6ffp: Windows Online Certificate Status Protocol (OCSP) SnapIn Remote Code Execution Vulnerability2023-07-11

📋Vendor Advisories

1
Microsoft
Windows Online Certificate Status Protocol (OCSP) SnapIn Remote Code Execution Vulnerability2023-07-11
CVE-2023-35313 — Use After Free in Microsoft | cvebase