Windows kernel-mode drivers vulnerabilities could allow remote code execution
Report ID: MS201310002
Date Published: 9 October 2013
Compromise Type: remote-code-execution privilege-escalation
Compromise From: remote
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
Seven vulnerabilities were reported found in the Windows kernel-mode drivers, two of which could lead to remote code execution and five others could lead to escalation of privileges.
Microsoft has released a security update to address multiple vulnerabilities in the Windows kernel-mode drivers. Seven vulnerabilities in total were reported, two of which could lead to remote code execution and five others could lead to escalation of privileges.
The vulnerabilities were mainly caused by improper handling of objects in memory and improper parsing of OpenType fonts. All of the issues have been resolved through the update which introduces necessary correction in the way that objects in memory are handled and the way that OpenType fonts are parsed. Users are recommended to install the update to protect their system from potential exploit attempts.
CVE-2013-3128, CVE-2013-3200, CVE-2013-3879, CVE-2013-3880, CVE-2013-3881, CVE-2013-3888, CVE-2013-3894
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-081)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.