Skip to main content

Microsoft Windows Kernel Mode Drivers Multiple Vulnerabilities ( 13 October 2010 )

Last Update Date: 28 Jan 2011 Release Date: 13 Oct 2010 5397 Views

RISK: Medium Risk

1. Win32k Reference Count Vulnerability

An elevation of privilege vulnerability exists due to the way that the Windows kernel-mode drivers maintain the reference count for an object. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

2. Win32k Keyboard Layout Vulnerability

An elevation of privilege vulnerability exists due to the way that the Windows kernel-mode drivers load specific keyboard layouts. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

3. Win32k Window Class Vulnerability

An elevation of privilege vulnerability exists when the Windows kernel-mode drivers do not properly validate window class data. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.