Windows kernel-mode drivers vulnerabilities could allow escalation of privilege
Report ID: MS201305010
Date Published: 15 May 2013
Criticality: Important
Compromise Type: privilege-escalation
Compromise From: local-system
Affected Product/Component:
Windows XP
Windows Server 2003
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8
Windows Server 2012
Windows RT
Summary
Three vulnerabilities discovered involving the Windows kernel-mode driver could allow an attacker to gain escalated privilege on an affected system.
Detailed Description
Microsoft has released a security update to address three vulnerabilities involving the kernel-mode drivers. Each of the vulnerability was caused by improper handling of objects in memory, and each could be exploited into allowing an attacker to gain escalated privileges on the affected system.
This issue has been resolved through the latest security update which introduces necessary corrections on the way that Windows handles objects in memory. Users are recommended to install this update to their system as a protection measure against possible exploit attempts.
CVE Reference
CVE-2013-1332, CVE-2013-1333, CVE-2013-1334
Solution
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-046)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.




