vulnerability

Microsoft Windows: CVE-2017-0060: Windows GDI Information Disclosure Vulnerability

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
2017-03-14
Added
2017-03-14
Modified
2024-09-24

Description

The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "GDI+ Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0060 and CVE-2017-0062.

Solution(s)

microsoft-windows-windows_10-1507-kb4012606microsoft-windows-windows_10-1511-kb4013198microsoft-windows-windows_10-1607-kb4013429microsoft-windows-windows_server_2012-kb4012214microsoft-windows-windows_server_2012_r2-kb4012213microsoft-windows-windows_server_2016-1607-kb4013429msft-kb3127945-15d7f98f-d025-4ea5-89aa-6fbb09a41e73msft-kb3127958-1364b203-6f20-4b86-a4cf-c977bf37eb8cmsft-kb3127958-e809e85f-8d03-43ba-b870-55dfd2084b01msft-kb3172539-4e9f1258-ae51-48dd-9886-85876fb49145msft-kb3172539-97245752-9ba4-4a22-8225-37a05ac53282msft-kb3178693-0f296363-e0d8-4cbc-a557-c7b114aab3ffmsft-kb4010299-3d61872a-3049-497f-8035-de67cc6cd8dbmsft-kb4010299-8ffb22e3-47ae-4712-8204-5bd087f061bemsft-kb4010301-b6fa22b4-e50e-4ace-97ca-5123b1ad8f09msft-kb4012212-13c36c25-fee4-429f-933e-f93ebfbb91f5msft-kb4012212-36e1591a-f6d3-44d2-aa25-540234b7eb36msft-kb4012212-4ee6f09d-38d9-47ef-8ba9-dd802352b8eemsft-kb4012212-652eea96-c2e8-4548-8f9a-40964e5e6a74msft-kb4012212-c682d11d-fc2e-4852-9da7-c2198958bf6cmsft-kb4012212-fb31138f-b6a5-499c-9eb6-5b5f9fff6bfdmsft-kb4012213-317ca43c-7dfe-4e04-8a21-2c6c4ab4fbb9msft-kb4012213-5d351df3-6efb-4b17-93e0-b0e3a5babbc3msft-kb4012214-1949e6d5-95b0-4e90-acfb-73c9d295fbbfmsft-kb4012214-b4d71d8b-1f2d-4958-ad08-e379293d71e8msft-kb4012583-1b63aa3c-f91b-46bf-962e-17498ed2ea98msft-kb4012583-3b57a1e7-0ab1-42cf-b9f3-219763e8a914msft-kb4012583-42807537-b593-4563-a113-39d694f30062msft-kb4012583-5b5708ac-0980-45ae-8be0-8c1de5dda16bmsft-kb4012583-69655ee2-b6a2-4861-a7db-63458d2fe785msft-kb4012583-74a23d5c-ef6f-4d05-8d73-c56397653c74msft-kb4012583-b5a29dfd-eb86-4658-b2e6-484008a1d783msft-kb4012583-bdedcab4-e7eb-441d-8cec-f5f117f678fcmsft-kb4012583-d2735278-3384-4173-8dcb-a420efb1e24bmsft-kb4012583-d4ab39a1-1433-4da5-a3c1-bfa2b0d7d3fbmsft-kb4012583-df17674b-e285-4b94-9c87-6179b28548f9msft-kb4012583-e04de567-48d3-4d6a-b0db-9138fbd40b26msft-kb4012583-fc2b107b-b264-49df-9bf0-c091f28f89a5
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.