CVE-2013-1345
Description
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Vulnerability."
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory handling flaw in win32k.sys allows local privilege escalation on multiple Windows versions; patched in MS13-053.
Vulnerability
The vulnerability resides in win32k.sys, the kernel-mode driver in Microsoft Windows. It occurs when the driver does not properly handle objects in memory. Affected versions include Windows XP SP2/SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2/R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT [1]. The bug is reachable by a local user running a crafted application.
Exploitation
An attacker must have local access to the system and be able to execute a specially crafted application. No additional authentication is required beyond the user's existing privileges. The application triggers the memory handling flaw in win32k.sys, leading to kernel-mode code execution [1].
Impact
Successful exploitation allows an attacker to gain elevated privileges, potentially achieving complete control over the affected system. This includes the ability to install programs, view/change/delete data, or create new accounts with full user rights [1]. The vulnerability is classified as an elevation of privilege issue.
Mitigation
Microsoft released security update MS13-053 (KB2850851) on July 9, 2013, which addresses this vulnerability [1]. Users should apply the update via Windows Update or manual installation. The US-CERT alert TA13-190A also recommends applying the updates [2]. No workarounds are documented; the only mitigation is to install the patch.
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
15- cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*+ 2 more
- cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*+ 1 more
- cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.