Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Vulnerability protection

Windows kernel-mode drivers vulnerabilities could allow escalation of privilege


Report ID: MS201303007
Date Published: 13 March 2013

Criticality: Important
Compromise Type: privilege-escalation
Compromise From: local-system


Affected Product/Component:

Windows XP
Windows Server 2003
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8
Windows Server 2012




Summary

Three vulnerabilities involving the Windows kernel-mode drivers could allow an attacker to execute code in kernel mode.



Detailed Description

Microsoft has released a security update to address three reported vulnerabilities that exist when Windows USB drivers fail to properly handle objects in memory. Upon successful exploitation, an attacker could be able to execute code on the affected system in kernel mode.

The issues have been resolved in the latest update by correcting the way that Windows kernel-mode driver handles objects in memory. Users are recommended to install the update to protect their system from possible exploit attempts.



CVE Reference

CVE-2013-1285, CVE-2013-1286, CVE-2013-1287



Solution

Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-027)




Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.