Microsoft Windows Win32k Read AV Vulnerability (MS13-053)

This module exploits a vulnerability in win32k.sys when the EPATHOBJ::pprFlattenRec() doesn't initialize the pointer to the next memory chunk.



This is only a documentation update of the original module "Microsoft Windows Win32k pprFlattenRec Vulnerability Exploit".



Exploit Type - Old
Exploits/Local
Exploit Platform
Exploit Type
Product Name