Microsoft Windows Kernel-Mode Drivers Elevation of Privilege Vulnerabilities
Last Update Date:
28 Aug 2014
Release Date:
13 Aug 2014
3741
Views
RISK: High Risk
TYPE: Operating Systems - Windows OS
- Win32k Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when the Windows kernel-mode driver improperly handles window handle thread-owned objects. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. - Font Double-Fetch Vulnerability
An elevation of privilege vulnerability exists in the way that the affected component handles objects from specially crafted font files. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. - Windows Kernel Pool Allocation Vulnerability
An information disclosure vulnerability exists in the way Windows kernel memory is managed. An attacker who successfully exploited this vulnerability could use it to disclose memory addresses or other sensitive kernel information.
Impact
- Elevation of Privilege
- Information Disclosure
System / Technologies affected
- Windows Server 2003
- Windows Vista
- Windows Server 2008
- Windows 7
- Windows Server 2008 R2
- Windows 8 and Windows 8.1
- Windows Server 2012 and Windows Server 2012 R2
- Windows RT and Windows RT 8.1
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Download location for patches:
https://technet.microsoft.com/en-us/library/security/MS14-045
2014-08-19 Update: The vendor recommends that customers uninstall the stated patch.
- How to uninstall this patch:
http://support.microsoft.com/kb/2982791
2014-08-28 Update: The vendor re-releases the patch for download.
Vulnerability Identifier
Source
Related Link
Share with