Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Vulnerability protection

Microsoft Windows vulnerabilities could allow escalation of privilege


Report ID: MS201206007
Date Published: 13 June 2012

Criticality: Important
Compromise Type: privilege-escalation
Compromise From: local-system


Affected Product/Component:

Windows XP
Windows Server 2003
Windows 7
Windows Server 2008 R2




Summary

Two reported vulnerabilities in Microsoft Windows could lead to escalation of privilege where an attacker could be able to execute code in kernel mode.



Detailed Description

Microsoft has released a security update to address two reported vulnerabilities in Windows kernel. The first vulnerability was found in Windows User Mode Scheduler (UMS); it resulted from incorrect handling of a particular system request. The second one existed when handling BIOS memory, and resulted when Windows failed to correctly protect BIOS ROM.

Both vulnerabilities require the attacker to log on to the local system first. Upon successful exploit, the attacker could run arbitrary code in kernel mode and take complete control of an affected system.

These issues have been resolved through the update by correcting the way of handling requests and managing BIOS ROM. Users are recommended to install the update to protect their system from potential exploit attempts.



CVE Reference

CVE-2012-0217, CVE-2012-1515



Solution

Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms12-042)




Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.