Windows kernel-mode drivers vulnerabilities could allow escalation of privilege
Report ID: MS201206006
Date Published: 13 June 2012
Compromise Type: privilege-escalation
Compromise From: local-system
Microsoft Server 2003
Microsoft Server 2008
Microsoft Server 2008 R2
Five vulnerabilities were reported found in Windows kernel-mode drivers, each of which leads to escalation of privilege where an attacker could be able to execute code in kernel mode.
Microsoft has issued a security update to address five reported vulnerabilities in Windows kernel-mode driver. The vulnerabilities were caused by improper validation of input passed from user mode, improper handling of TrueType font loading, and a race condition when creating specific types of threads.
A successful exploit of the vulnerabilties could lead to the attacker gaining escalated privilege on the affected system. The attacker could then execute arbitrary code in kernel mode and take complete control of the system.
These issues have all been resolved in the update by correcting the way of validating data and loading TrueType font, and by introducing additional runtime validation to the thread creation mechanism. Users are recommended to install the latest update to protect their system from potential exploit attempts.
CVE-2012-1864, CVE-2012-1865, CVE-2012-1866, CVE-2012-1867, CVE-2012-1868
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms12-041)