Anatomy of an exploit in Windows win32k - CVE-2022-21882 - Avira Blog
Common Information
Type Value
UUID 32c07f23-82ac-40c7-bd2e-1d067be841cf
Fingerprint 8419595b88a9b6f1
Analysis status DONE
Considered CTI value 0
Text language
Published June 9, 2022, 12:41 p.m.
Added to db Aug. 31, 2024, 11:06 a.m.
Last updated Nov. 17, 2024, 7:44 p.m.
Headline Anatomy of an exploit in Windows win32k – CVE-2022-21882
Title Anatomy of an exploit in Windows win32k - CVE-2022-21882 - Avira Blog
Detected Hints/Tags/Attributes 47/1/19
RSS Feed
Attributes
Details Type #Events CTI Value
Details CVE 19
cve-2022-21882
Details CVE 45
cve-2021-1732
Details Domain 452
msrc.microsoft.com
Details Domain 4127
github.com
Details Domain 281
docs.microsoft.com
Details Domain 1
keramas.github.io
Details File 115
win32k.sys
Details File 291
user32.dll
Details File 1
hmvalidatehandle.cpp
Details File 1
windows-10-2004-eprocess-structure.html
Details Github username 3
kalendsi
Details Github username 2
sam-b
Details Url 1
https://msrc.microsoft.com/update-guide/vulnerability/cve-2022-21882
Details Url 1
https://msrc.microsoft.com/update-guide/vulnerability/cve-2021-1732
Details Url 1
https://github.com/kalendsi/cve-2022-21882
Details Url 1
https://github.com/sam-b/windows_kernel_address_leaks/blob/master/hmvalidatehandle/hmvalidatehandle/hmvalidatehandle.cpp
Details Url 1
https://docs.microsoft.com/en-us/windows/win32/api/winuser/nf-winuser-setwindowlongptra
Details Url 1
https://docs.microsoft.com/en-us/windows/win32/api/winuser/nf-winuser-getmenubarinfo
Details Url 1
https://keramas.github.io/2020/06/21/windows-10-2004-eprocess-structure.html