Description
The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to bypass the KASLR protection mechanism, and consequently discover a driver base address, via a crafted application, aka "Windows Kernel Memory Information Disclosure Vulnerability."
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Nils Sommer · textdoswindows
https://www.exploit-db.com/exploits/38794
References (4)
Core 4
Core References
Patch, Vendor Advisory vendor-advisory
x_refsource_ms
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-115
Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/38794/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1034114
Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/134519/Microsoft-Windows-Cursor-Object-Potential-Memory-Leak.html
Scores
EPSS
0.0382
EPSS Percentile
88.2%
Details
CWE
CWE-200
Status
published
Products (12)
microsoft/windows_10
microsoft/windows_10
1511
microsoft/windows_7
microsoft/windows_8
microsoft/windows_8.1
microsoft/windows_rt
microsoft/windows_rt_8.1
microsoft/windows_server_2008
microsoft/windows_server_2008
r2 sp1 (2 CPE variants)
microsoft/windows_server_2012
... and 2 more
Published
Nov 11, 2015
Tracked Since
Feb 18, 2026