Microsoft Windows Kernel-Mode Drivers PostMessage Function Vulnerability
Last Update Date:
14 Mar 2012 12:18
Release Date:
14 Mar 2012
5514
Views
RISK: Medium Risk
TYPE: Operating Systems - Windows OS
An elevation of privilege vulnerability exists in the way that the Windows kernel-mode driver manages the PostMessage function. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.
Impact
- Elevation of Privilege
System / Technologies affected
- Windows XP
- Windows Server 2003
- Windows Vista
- Windows Server 2008
- Windows 7
- Windows Server 2008 R2
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Download location for patches:
http://technet.microsoft.com/en-us/security/bulletin/ms12-018
Vulnerability Identifier
Source
Related Link
Share with