Windows kernel-mode drivers vulnerabilities could allow escalation of privilege
Report ID: MS201309010
Date Published: 11 September 2013
Compromise Type: privilege-escalation
Compromise From: local-system
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
Seven vulnerabilities reported found in the Windows kernel-mode driver could each lead to escalation of privilege situation.
Microsoft has released a security update to address seven reported vulnerabilities in the Windows kernel-mode driver. The vulnerabilities were caused by improper handling of objects in memory, and each of them could be exploited into allowing the attacker to gain escalated privileges and read arbitrary amounts of kernel memory.
The vulnerabilities have been patched through the latest update which corrected the way that objects in memory are handled. Users are recommended to install the update to protect their system from exploit attempts.
CVE-2013-1341, CCVE-2013-1342, CVE-2013-1343, CVE-2013-1344, CVE-2013-1364, CVE-2013-1365, CVE-2013-1366
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-076)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.