Microsoft Windows vulnerabilities could allow escalation of privilege
Report ID: MS201304004
Date Published: 10 April 2013
Compromise Type: privilege-escalation
Compromise From: local-system
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
Two vulnerabilities in the Windows kernel could be exploited by an attacker to gain escalated privileges on an affected system.
Microsoft has released a security update to resolve two reported vulnerabilities in the Windows kernel. The vulnerabilities were caused by improper handling of objects in memory, and each could be exploited into allowing an attacker to gain escalated privileges on the affected system and read arbitrary amounts of kernel memory. To exploit the vulnerabilities, the attacker must be able to log on to the local system before being able to run specially crafted applications.
These vulnerabilities have been fixed through the latest security update, which introduces a correction in the way that objects in memory are handled. Users are recommended to install this update to protect their system from possible exploit attempts.
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-031)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.