Description
Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Vista SP1 and SP2 and Server 2008 Gold and SP2 allows local users to gain privileges or cause a denial of service (system crash) by using a large number of calls to the NtUserCheckAccessForIntegrityLevel function to trigger a failure in the LockProcessByClientId function, leading to deletion of an in-use process object, aka "Win32k Reference Count Vulnerability."
Exploits (1)
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12215
Exploit mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2010/Jul/3
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/14156
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/41280
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/40421
US Government Resource third-party-advisory
x_refsource_cert
http://www.us-cert.gov/cas/techalerts/TA10-285A.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/66003
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/60120
Scores
EPSS
0.0381
EPSS Percentile
88.2%
Details
CWE
CWE-399
Status
published
Products (2)
microsoft/windows_server_2008
(6 CPE variants)
microsoft/windows_vista
(2 CPE variants)
Published
Jul 02, 2010
Tracked Since
Feb 18, 2026