Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities
Last Update Date:
13 Apr 2011 18:14
Release Date:
13 Apr 2011
6422
Views
RISK: Medium Risk
TYPE: Operating Systems - Windows OS
- Win32k Use After Free Vulnerability
An elevation of privilege vulnerability exists due to the way that Windows Kernel-mode drivers manage kernel-mode driver objects. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. - Win32k Null Pointer De-reference Vulnerability
An elevation of privilege vulnerability exists due to the way that Windows Kernel-mode drivers manage pointers to kernel-mode driver objects. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Impact
- Elevation of Privilege
System / Technologies affected
- Windows XP
- Windows Server 2003
- Windows Vista
- Windows Server 2008
- Windows 7
- Windows Server 2008 R2
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Download location for patches:
Vulnerability Identifier
- CVE-2011-0662
- CVE-2011-0665
- CVE-2011-0666
- CVE-2011-0667
- CVE-2011-0670
- CVE-2011-0671
- CVE-2011-0672
- CVE-2011-0674
- CVE-2011-0675
- CVE-2011-1234
- CVE-2011-1235
- CVE-2011-1236
- CVE-2011-1237
- CVE-2011-1238
- CVE-2011-1239
- CVE-2011-1240
- CVE-2011-1241
- CVE-2011-1242
- CVE-2011-0673
- CVE-2011-0676
- CVE-2011-0677
- CVE-2011-1225
- CVE-2011-1226
- CVE-2011-1227
- CVE-2011-1228
- CVE-2011-1229
- CVE-2011-1230
- CVE-2011-1231
- CVE-2011-1232
- CVE-2011-1233
Source
Related Link
Share with