Skip to main content

Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities

Last Update Date: 13 Jun 2012 15:27 Release Date: 13 Jun 2012 4672 Views

RISK: Medium Risk

TYPE: Operating Systems - Windows OS

TYPE: Windows OS
  1. String Atom Class Name Handling Vulnerability
    An elevation of privilege vulnerability exists because of the way that Windows kernel-mode drivers manage kernel-mode driver objects. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.
  2. Clipboard Format Atom Name Handling Vulnerability
    An elevation of privilege vulnerability exists because of the way that Windows kernel-mode drivers manage kernel-mode driver objects. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.
  3. Font Resource Refcount Integer Overflow Vulnerability
    An elevation of privilege vulnerability exists because the Windows kernel-mode drivers do not properly allocate memory when handling fonts. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.
  4. Win32k.sys Race Condition Vulnerability
    An elevation of privilege vulnerability exists in the Windows kernel because of the way that the kernel deals with specific thread creation attempts. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.

Impact

  • Elevation of Privilege

System / Technologies affected

  • Windows XP
  • Windows Vista
  • Windows 7
  • Windows Server 2003
  • Windows Server 2008
  • Windows Server 2008 R2

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

 


Vulnerability Identifier


Source

 


Related Link