CVE-2013-1280

Severity

72%

Complexity

39%

Confidentiality

165%

The kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Reference Count Vulnerability."

The kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Reference Count Vulnerability."

CVSS 2.0 Base Score 7.2. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C).

Overview

First reported 12 years ago

2013-02-13 12:04:00

Last updated 5 years ago

2019-02-26 14:04:00

Affected Software

Microsoft Windows 7 x64 (64-bit)

Microsoft Windows 7 x86 (32-bit)

Microsoft Windows 7 64-bit Service Pack 1 (initial release)

Microsoft Windows 7 x86 Service Pack 1

Microsoft Windows Server 2003 Service Pack 2

Windows Server 2008 R2 for Itanium-based Systems

Windows Server 2008 R2 for x64-based Systems

Microsoft Windows Server 2008 Service Pack 2 for Itanium-Based Systems

Microsoft Windows Server 2008 Service Pack 2 x64 (64-bit)

Windows Server 2008 Service Pack 2 x86

Microsoft Windows Server 2008 r2 Service Pack 1 Itanium

r2

Microsoft Windows Server 2008 R2 Service Pack 1 x64 (64-bit)

r2

Microsoft Windows Vista Service Pack 2

Microsoft Windows Vista Service Pack 2 x64 (64-bit)

Microsoft Windows XP Service Pack 3

Microsoft Windows XP Service Pack 2 x64 (64-bit)

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.