Windows kernel-mode drivers vulnerabilities could allow remote code execution
Report ID: MS201202001
Date Published: 15 February 2012
Compromise Type: remote-code-execution privilege-escalation
Compromise From: remote local-system
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Two vulnerabilities affecting the Windows kernel-mode drivers could allow an attacker to execute arbitrary code and take control of an affected system.
Microsoft has issued a security update to address two vulnerabilities found in the win32k.sys component. One vulnerability, caused by improper validation of the input passed through the kernel component of GDI, could allow an attacker to execute arbitrary code from a remote location.
The other vulnerability was caused by improper handling of keyboard layout errors. It could allow an attacker to execute code in kernel mode, but to exploit this vulnerability, the attacker must first log on to the local system.
In the latest security update, modification has been made in the way that user mode calls to GDI are handled, and the way that keyboard layout errors are handled. Users are recommended to install this latest update to protect their system from potential exploit.
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms12-008)