Microsoft Windows Win32k Read AV Vulnerability (MS13-053) Update

This module exploits a vulnerability in win32k.sys when the EPATHOBJ::pprFlattenRec() doesn't initialize the pointer to the next memory chunk.



This update adds support to Windows 2003 64 bits, Windows Vista 64 bits, Windows 2008 64 bits, Windows 2008 R2, Windows 7 64 bits, Windows 8 64 bits and Windows 2012 64 bits.
Exploit Type - Old
Exploits/Local
Exploit Platform
Exploit Type
Product Name