Microsoft Windows vulnerabilities could allow escalation of privilege
Report ID: MS201206007
Date Published: 13 June 2012
Criticality: Important
Compromise Type: privilege-escalation
Compromise From: local-system
Affected Product/Component:
Windows XP
Windows Server 2003
Windows 7
Windows Server 2008 R2
Summary
Two reported vulnerabilities in Microsoft Windows could lead to escalation of privilege where an attacker could be able to execute code in kernel mode.
Detailed Description
Microsoft has released a security update to address two reported vulnerabilities in Windows kernel. The first vulnerability was found in Windows User Mode Scheduler (UMS); it resulted from incorrect handling of a particular system request. The second one existed when handling BIOS memory, and resulted when Windows failed to correctly protect BIOS ROM.
Both vulnerabilities require the attacker to log on to the local system first. Upon successful exploit, the attacker could run arbitrary code in kernel mode and take complete control of an affected system.
These issues have been resolved through the update by correcting the way of handling requests and managing BIOS ROM. Users are recommended to install the update to protect their system from potential exploit attempts.
CVE Reference
CVE-2012-0217, CVE-2012-1515
Solution
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms12-042)




