Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Vulnerability protection

Windows kernel-mode driver vulnerabilities could allow escalation of privilege


Report ID: MS201302008
Date Published: 22 February 2013

Criticality: Important
Compromise Type: privilege-escalation
Compromise From: local-system


Affected Product/Component:

Windows XP
Windows Server 2003
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8
Windows Server 2012
Windows RT




Summary

Multiple vulnerabilities found in the Windows kernel-mode driver could allow an attacker to obtain privilege escalation and read arbitrary amounts of kernel memory.



Detailed Description

Microsoft has released a security update to resolve multiple vulnerabilities found in the Windows kernel-mode driver. The vulnerabilities were caused by improper handling of objects in memory, and can be exploited to allow an attacker to gain privilege escalation. Upon successful exploit, an attacker could be able to read arbitrary amounts of kernel memory.

The vulnerabilities have been patched through the latest security update, which introduces a correction in the way that objects in memory are handled. Users are recommended to install the latest update onto their system as a protection measure.



CVE Reference

CVE-2013-1248 - CVE-2013-1277 (30 vulnerabilities)



Solution

Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-016)



Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.