CVE-2013-3661

Microsoft Windows 7 - Path Traversal

Title source: rule

Description

The EPATHOBJ::bFlatten function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not check whether linked-list traversal is continually accessing the same list member, which allows local users to cause a denial of service (infinite traversal) via vectors that trigger a crafted PATHRECORD chain.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/26554
exploitdb WORKING POC VERIFIED
by Tavis Ormandy · clocalwindows
https://www.exploit-db.com/exploits/25912
exploitdb WORKING POC VERIFIED
by Tavis Ormandy · textdoswindows
https://www.exploit-db.com/exploits/25611

Scores

EPSS 0.0176
EPSS Percentile 82.7%

Details

CWE
CWE-22
Status published
Products (9)
microsoft/windows_7 (2 CPE variants)
microsoft/windows_8 (2 CPE variants)
microsoft/windows_rt
microsoft/windows_server_2003
microsoft/windows_server_2008
microsoft/windows_server_2008 r2 sp1
microsoft/windows_server_2012
microsoft/windows_vista
microsoft/windows_xp (2 CPE variants)
Published May 24, 2013
Tracked Since Feb 18, 2026