Microsoft Windows Kernel-Mode Drivers Elevation of Privilege Vulnerabilities
Last Update Date:
10 Mar 2016
Release Date:
9 Mar 2016
3997
Views
RISK: Medium Risk
TYPE: Operating Systems - Windows OS
Multiple Win32k elevation of privilege vulnerabilities exist when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Impact
- Denial of Service
- Elevation of Privilege
System / Technologies affected
- Microsoft Windows Vista
- Microsoft Windows Server 2008
- Microsoft Windows 7
- Microsoft Windows Server 2008 R2
- Microsoft Windows 8.1
- Microsoft Windows Server 2012 and Windows Server 2012 R2
- Microsoft Windows RT 8.1
- Microsoft Windows 10
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Download location for patches:
https://technet.microsoft.com/en-us/library/security/MS16-034
Vulnerability Identifier
Source
Related Link
Share with