New Search

Win32k Bounds Checking Vulnerability

oval:org.mitre.oval:def:11020

The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3 Windows Server 2003 SP2 Windows Vista SP1 and SP2 Windows Server 2008 Gold SP2 and R2 and Windows 7 do not properly validate an unspecified system-call argument which allows local users to cause a denial of service (system hang) via a crafted application aka "Win32k Bounds Checking Vulnerability."

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows Vista
  • Microsoft Windows Server 2003
  • Microsoft Windows Server 2008 R2
  • Microsoft Windows Server 2008
  • Microsoft Windows 7
  • Microsoft Windows XP
Class:
vulnerability
Reference(s):
  • CVE-2010-1887
Product(s):