CVE-2013-1300

EXPLOITED

Microsoft Windows - Privilege Escalation

Title source: llm

Description

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Allocation Vulnerability."

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalwindows_x86
https://www.exploit-db.com/exploits/33213
nomisec STUB 9 stars
by Meatballs1 · dos
https://github.com/Meatballs1/cve-2013-1300
metasploit WORKING POC NORMAL
by Nils, Jon · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ms13_053_schlamperei.rb

Scores

EPSS 0.2722
EPSS Percentile 96.4%

Details

VulnCheck KEV 2022-11-03
CWE
CWE-264
Status published
Products (8)
microsoft/windows_7 (2 CPE variants)
microsoft/windows_8 (2 CPE variants)
microsoft/windows_rt
microsoft/windows_server_2003
microsoft/windows_server_2008 (3 CPE variants)
microsoft/windows_server_2012
microsoft/windows_vista
microsoft/windows_xp (2 CPE variants)
Published Jul 10, 2013
Tracked Since Feb 18, 2026