2016-12-13 This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if a locally-authenticated attacker runs a specially crafted application on a targeted system. An attacker who successfully exploited the vulnerability could violate virtual trust levels (VTL).
Vulnerabilities addressed in this bulletin:
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when Windows Secure Kernel Mode fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could violate virtual trust levels (VTL).
CVE-2016-7271

Bulletin details at Microsoft.com

Related CVE Entries

The Secure Kernel Mode implementation in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to bypass the virtual trust level (VTL) protection mechanism via a crafted application, aka "Secure Kernel Mode Elevation of Privilege Vulnerability."
Max CVSS
7.8
EPSS Score
0.04%
Published
2016-12-20
Updated
2018-10-12
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!