CVE-2013-3660

HIGH KEV RANSOMWARE

Microsoft Windows 7 - Memory Corruption

Title source: rule

Description

The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the PATHRECORD chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many FlattenPath function calls, aka "Win32k Read AV Vulnerability."

Exploits (5)

nomisec NO CODE 3 stars
by ExploitCN · poc
https://github.com/ExploitCN/CVE-2013-3660-x64-WIN7
exploitdb WORKING POC VERIFIED
by Tavis Ormandy · textdoswindows
https://www.exploit-db.com/exploits/25611
exploitdb WORKING POC
clocalwindows
https://www.exploit-db.com/exploits/25912
exploitdb WORKING POC
rubylocalwindows
https://www.exploit-db.com/exploits/26554
metasploit WORKING POC NORMAL
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ppr_flatten_rec.rb

Scores

CVSS v3 7.8
EPSS 0.6917
EPSS Percentile 98.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2022-03-28
VulnCheck KEV 2015-01-06
InTheWild.io 2022-03-28
ENISA EUVD EUVD-2013-3593
Ransomware Use Confirmed

Classification

CWE
CWE-119
Status draft

Affected Products (10)

microsoft/windows_7
microsoft/windows_8
microsoft/windows_rt
microsoft/windows_server_2003
microsoft/windows_server_2008
microsoft/windows_server_2008
microsoft/windows_server_2012
microsoft/windows_vista
microsoft/windows_xp
microsoft/windows_xp

Timeline

Published May 24, 2013
KEV Added Mar 28, 2022
Tracked Since Feb 18, 2026