Microsoft Windows Win32k TrackPopupMenu Null Pointer Dereference Privilege Escalation Exploit (MS14-058) Update

This module exploits a null pointer dereference in win32k.sys by abusing of xxxSendMessageTimeout function. The TrackPopupMenu API function is used to trigger the vulnerability. This update adds support for x86-64 platforms.
Exploit type: 
Platform: 
Vulnerabilty ID: 
CVE-2014-4113
Product Version: 
2014_R2
Released Date: 
Monday, November 10, 2014 - 00:00