1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar

Vulnerability protection

Windows kernel mode driver vulnerabilities could allow escalation of privilege

Report ID: MS201304009
Date Published: 10 April 2013

Criticality: Important
Compromise Type: privilege-escalation
Compromise From: local-system remote

Affected Product/Component:

Windows XP
Windows Server 2003
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8
Windows Server 2012
Windows RT


Four vulnerabilities were reported found in Windows, three of which could lead to escalation of privilege and one could lead to denial of service condition.

Detailed Description

Microsoft has released a security update to address four reported vulnerabilities in the Windows kernel-mode driver. Three of the vulnerabilities were caused by improper handling of objects in memory; they could be exploited into allowing an attacker to gain escalated privileges and read arbitrary amounts of kernel  memory. The other one vulnerability was caused by improper handling of a specially crafted font file, and upon successful exploitation, it could cause the system to stop responding and restart.

All of the issues have been fixed in the latest update by correcting the way that objects in memory and specially crafted font files are handled. Users are recommended to install the update as a protection measure against possible exploit attempts.

CVE Reference

CVE-2013-1283, CVE-2012-1291, CVE-2013-1292, CVE-2013-1293


Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-036)

Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.