Windows kernel-mode driver vulnerability could allow privilege escalation
Report ID: MS201301005
Date Published: 10 January 2013
Criticality: Important
Compromise Type: privilege-escalation
Compromise From: remote
Affected Product/Component:
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8
Windows Server 2012
Windows RT
Summary
A vulnerability in the Windows kernel could allow an attacker to execute code in the context of a higher Integrity Level (IL) process upon successful exploitation.
Detailed Description
Microsoft has issued a security update to address a vulnerability in the Windows kernel which was caused by improper handling of window broadcast messages. Upon successful exploitation, an attacker could be able to execute code with elevated privileges, in the context of a higher Integrity Level (IL) process.
This vulnerability has been resolved through the latest security update by correcting the way in handling window broadcast messages. Users are recommended to install this update onto their system to protect from potential attacks or exploit attempts.
CVE Reference
CVE-2013-0008
Solution
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-005)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.




