1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar

Vulnerability protection

Windows kernel-mode drivers vulnerabilities could allow remote code execution

Report ID: MS201211005
Date Published: 14 November 2012

Criticality: Critical
Compromise Type: remote-code-execution privilege-escalation
Compromise From: remote

Affected Product/Component:

Windows XP
Windows Server 2003
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8
Windows Server 2012


Three reported vulnerabilities involving Windows kernel-mode driver could allow an attacker to execute arbitrary code with escalated privileges.

Detailed Description

Microsoft has released a security update to address three vulnerabilities that are affecting the kernel-mode driver. The vulnerabilities were caused by either improper handling of objects in memory or improper handling of TrueType Fonts (TTF). Upon successful exploitation, an attacker could be able to execute code in kernel mode and gain similar rights as the logged-on user.

These issues have all been addressed in the latest security update by introducing relevant modifications and changes. Users are recommended to install this update onto their system as a protection measure against potential exploit attempts. 

CVE Reference

CVE-2012-2530, CVE-2012-2553, CVE-2012-2897


Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms12-075)

Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.