Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Vulnerability protection

Windows kernel-mode drivers vulnerability could allow escalation of privilege


Report ID: MS201208004
Date Published: 15 August 2012

Criticality: Important
Compromise Type: privilege-escalation
Compromise From: local-system


Affected Product/Component:

Windows XP
Windows Server 2003
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2




Summary

A vulnerability identified in Windows kernel-mode driver could upon successful exploitation, allow an attacker to execute code in kernel mode.



Detailed Description

Microsoft has released a securitiy update to address an escalation of privilege vulnerability in the Windows kernel-mode driver. The vulnerability was caused by improper handling of objects in memory, and could be exploited into gaining the privilege of executing code in kernel mode. However, in order to exploit the vulnerability, the attacker must first log on to the system, and then run a specially crafted application.

This issue has been fixed by making correction in the way that objects in memory are handled. Users are recommended to install the latest update to protect their system from potential exploit attempts.



CVE Reference

CVE-2012-2527



Solution

Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms12-055)



Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.