Skip to main content

Microsoft Windows Kernel-Mode Drivers Elevation of Privilege Vulnerabilities

Last Update Date: 28 Aug 2014 Release Date: 13 Aug 2014 3741 Views

RISK: High Risk

TYPE: Operating Systems - Windows OS

TYPE: Windows OS
  1. Win32k Elevation of Privilege Vulnerability
    An elevation of privilege vulnerability exists when the Windows kernel-mode driver improperly handles window handle thread-owned objects. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.
  2. Font Double-Fetch Vulnerability
    An elevation of privilege vulnerability exists in the way that the affected component handles objects from specially crafted font files. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges.
  3. Windows Kernel Pool Allocation Vulnerability
    An information disclosure vulnerability exists in the way Windows kernel memory is managed. An attacker who successfully exploited this vulnerability could use it to disclose memory addresses or other sensitive kernel information.

Impact

  • Elevation of Privilege
  • Information Disclosure

System / Technologies affected

  • Windows Server 2003
  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows Server 2008 R2
  • Windows 8 and Windows 8.1
  • Windows Server 2012 and Windows Server 2012 R2
  • Windows RT and Windows RT 8.1

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

2014-08-19 Update: The vendor recommends that customers uninstall the stated patch.

  • How to uninstall this patch:
    http://support.microsoft.com/kb/2982791

2014-08-28 Update: The vendor re-releases the patch for download.


Vulnerability Identifier


Source


Related Link