Microsoft Windows vulnerabilities could allow escalation of privilege
Report ID: MS201206007
Date Published: 13 June 2012
Compromise Type: privilege-escalation
Compromise From: local-system
Windows Server 2003
Windows Server 2008 R2
Two reported vulnerabilities in Microsoft Windows could lead to escalation of privilege where an attacker could be able to execute code in kernel mode.
Microsoft has released a security update to address two reported vulnerabilities in Windows kernel. The first vulnerability was found in Windows User Mode Scheduler (UMS); it resulted from incorrect handling of a particular system request. The second one existed when handling BIOS memory, and resulted when Windows failed to correctly protect BIOS ROM.
Both vulnerabilities require the attacker to log on to the local system first. Upon successful exploit, the attacker could run arbitrary code in kernel mode and take complete control of an affected system.
These issues have been resolved through the update by correcting the way of handling requests and managing BIOS ROM. Users are recommended to install the update to protect their system from potential exploit attempts.
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms12-042)