1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar

Vulnerability protection

Windows kernel vulnerability could allow escalation of privilege

Report ID: MS201210005
Date Published: 10 October 2012

Criticality: Important
Compromise Type: privilege-escalation
Compromise From: local-system

Affected Product/Component:

Windows XP
Windows Server 2003
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2


A vulnerability in Windows kernel could allow an attacker to execute code in kernel mode.

Detailed Description

Microsoft has released a security update to address a vulnerability in Windows kernel, which was caused by improper handling of objects in memory. An attacker who successfully exploit the vulnerability could be able to execute code in kernel mode, but to exploit it, the attacker must first log in to the system and then run a specially crafted program.

The issued security update addresses the vulnerability by correcting the way that Windows kernel handles objects in memory. Users are recommended to install this update to protect their system from potential exploit attempts.

CVE Reference



Install the latest security patch for applicable system, available for download from (http://technet.microsoft.com/en-us/security/bulletin/ms12-068)

Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.