Windows kernel-mode drivers vulnerabilities could allow remote code execution
Report ID: MS201211005
Date Published: 14 November 2012
Compromise Type: remote-code-execution privilege-escalation
Compromise From: remote
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
Three reported vulnerabilities involving Windows kernel-mode driver could allow an attacker to execute arbitrary code with escalated privileges.
Microsoft has released a security update to address three vulnerabilities that are affecting the kernel-mode driver. The vulnerabilities were caused by either improper handling of objects in memory or improper handling of TrueType Fonts (TTF). Upon successful exploitation, an attacker could be able to execute code in kernel mode and gain similar rights as the logged-on user.
These issues have all been addressed in the latest security update by introducing relevant modifications and changes. Users are recommended to install this update onto their system as a protection measure against potential exploit attempts.
CVE-2012-2530, CVE-2012-2553, CVE-2012-2897
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms12-075)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.