1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar

Vulnerability protection

Windows kernel vulnerabilities could allow escalation of privilege

Report ID: MS201302009
Date Published:

Criticality: Important
Compromise Type: privilege-escalation
Compromise From: local-system

Affected Product/Component:

Windows XP
Windows Server 2003
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8
Windows Server 2012
Windows RT


Three vulnerabilities found in the Windows kernel could allow an attacker to execute code in kernel mode.

Detailed Description

Microsoft has released a security update to address three reported vulnerabilities in the Windows kernel. The vulnerabilities were caused by improper handling of objects in memory. Upon successful exploitation, each could allow an attacker to run arbitrary code in kernel mode.

The latest update release fixes these issues by correcting the way that Windows kernel handles objects in memory. Users are recommended to install the latest update to protect their system from possible exploit attempts.

CVE Reference

CVE-2013-1278, CVE-2013-1279, CVE-2013-1280


Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-017)

Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.