The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly handle use of the paged kernel pool for allocation of uninitialized memory, which allows local users to obtain sensitive information about kernel addresses via a crafted application, aka "Windows Kernel Pool Allocation Vulnerability."
References
Link | Resource |
---|---|
http://secunia.com/advisories/60673 | Third Party Advisory |
http://www.securityfocus.com/bid/69144 | Third Party Advisory VDB Entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-045 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2014-08-12 21:55
Updated : 2024-02-04 18:35
NVD link : CVE-2014-4064
Mitre link : CVE-2014-4064
CVE.ORG link : CVE-2014-4064
JSON object : View
Products Affected
microsoft
- windows_8
- windows_server_2012
- windows_8.1
- windows_7
- windows_rt
- windows_server_2003
- windows_server_2008
- windows_vista
- windows_rt_8.1
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer