1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar

Vulnerability protection

Windows kernel-mode drivers vulnerabilities could allow remote code execution

Report ID: MS201212002
Date Published: 12 December 2012

Criticality: Critical
Compromise Type: remote-code-execution privilege-escalation
Compromise From: remote

Affected Product/Component:

Windows XP
Windows Server 2003
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8
Windows Server 2012


Two vulnerabilities involving Windows kernel-mode drivers could be exploited into allowing an attacker to execute code on an affected system.

Detailed Description

Microsoft has issued a security update to address two reported vulnerabilities in the Windows kernel-mode drivers that were caused by improper handling of OpenType Font and TrueType Font files. Upon successful exploitation, an attacker may be able to run code in kernel mode and take control of the affected system.

Through the latest update, these issues have been resolved by correcting the way that Windows kernel-mode driver handles objects in memory. Users are recommended to install this update to protect their systems against possible exploit attempts.

CVE Reference

CVE-2012-2556, CVE-2012-4786


Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms12-078)

Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.