Skip to main content

Microsoft Windows Kernel-Mode Drivers Multiple Vulnerability

Last Update Date: 28 Jan 2011 Release Date: 15 Dec 2010 5567 Views

RISK: Medium Risk

1. Win32k Buffer Overflow Vulnerability
2. Win32k PFE Pointer Double Free Vulnerability
3. Win32k Double Free Vulnerability
4. Win32k Cursor Linking Vulnerability

An elevation of privilege vulnerability exists due to the way that the Windows kernel-mode drivers free objects that are no longer in use. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

5. Win32k WriteAV Vulnerability

An elevation of privilege vulnerability exists in the way that Windows kernel-mode drivers improperly allocate memory when copying data from user mode. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

6. Win32k Memory Corruption Vulnerability

An elevation of privilege vulnerability exists in the way that the Windows kernel-mode drivers improperly validate input passed from user mode. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.