Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Vulnerability protection

Windows kernel-mode drivers vulnerabilities could allow escalation of privilege


Report ID: MS201206006
Date Published: 13 June 2012

Criticality: Important
Compromise Type: privilege-escalation
Compromise From: local-system


Affected Product/Component:

Microsoft XP
Microsoft Server 2003
Microsoft Vista
Microsoft Server 2008
Microsoft 7
Microsoft Server 2008 R2




Summary

Five vulnerabilities were reported found in Windows kernel-mode drivers, each of which leads to escalation of privilege where an attacker could be able to execute code in kernel mode.



Detailed Description

Microsoft has issued a security update to address five reported vulnerabilities in Windows kernel-mode driver. The vulnerabilities were caused by improper validation of input passed from user mode, improper handling of TrueType font loading, and a race condition when creating specific types of threads.

A successful exploit of the vulnerabilties could lead to the attacker gaining escalated privilege on the affected system. The attacker could then execute arbitrary code in kernel mode and take complete control of the system.

These issues have all been resolved in the update by correcting the way of validating data and loading TrueType font, and by introducing additional runtime validation to the thread creation mechanism. Users are recommended to install the latest update to protect their system from potential exploit attempts.

 



CVE Reference

CVE-2012-1864, CVE-2012-1865, CVE-2012-1866, CVE-2012-1867, CVE-2012-1868



Solution

Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms12-041)



Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.