CVE-2013-3661
Microsoft Windows 7 - Path Traversal
Title source: ruleDescription
The EPATHOBJ::bFlatten function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not check whether linked-list traversal is continually accessing the same list member, which allows local users to cause a denial of service (infinite traversal) via vectors that trigger a crafted PATHRECORD chain.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/26554
exploitdb
WORKING POC
VERIFIED
by Tavis Ormandy · clocalwindows
https://www.exploit-db.com/exploits/25912
exploitdb
WORKING POC
VERIFIED
by Tavis Ormandy · textdoswindows
https://www.exploit-db.com/exploits/25611
References (9)
Scores
EPSS
0.0176
EPSS Percentile
82.7%
Details
CWE
CWE-22
Status
published
Products (9)
microsoft/windows_7
(2 CPE variants)
microsoft/windows_8
(2 CPE variants)
microsoft/windows_rt
microsoft/windows_server_2003
microsoft/windows_server_2008
microsoft/windows_server_2008
r2 sp1
microsoft/windows_server_2012
microsoft/windows_vista
microsoft/windows_xp
(2 CPE variants)
Published
May 24, 2013
Tracked Since
Feb 18, 2026