Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities
Last Update Date:
10 Jul 2013 15:14
Release Date:
10 Jul 2013
3922
Views
RISK: High Risk
TYPE: Operating Systems - Windows OS
- Win32k Memory Allocation Vulnerability
An elevation of privilege vulnerability exists when the Windows kernel-mode driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. - Win32k Dereference Vulnerability
An elevation of privilege vulnerability exists in the way that the Windows kernel-mode driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. - Win32k Vulnerability
An elevation of privilege vulnerability exists in the way that the Windows kernel-mode driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. - TrueType Font Parsing Vulnerability
A remote code execution vulnerability exists in the way that affected components handle specially crafted TrueType font files. The vulnerability could allow remote code execution if a user opens a specially crafted TrueType font file. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. - Win32k Information Disclosure Vulnerability
An information disclosure vulnerability that could lead to elevation of privilege exists in the way that the Windows kernel-mode driver improperly handles objects in memory. - Win32k Buffer Overflow Vulnerability
A denial of service vulnerability exists in the way that the Windows kernel-mode driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could cause the target system to stop responding. - Win32k Buffer Overwrite Vulnerability
An elevation of privilege vulnerability exists in the way that the Windows kernel-mode driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated privileges. - Win32k Read AV Vulnerability
A theoretical remote code execution vulnerability exists when the Windows kernel-mode driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability as a remote code execution vulnerability could execute arbitrary code in the security context of the Windows kernel. However, since the remote attack vector is not likely, it is more likely that an attacker would first need to log on to the target system to successfully exploit this vulnerability and gain elevated privileges.
Impact
- Denial of Service
- Elevation of Privilege
- Remote Code Execution
- Information Disclosure
System / Technologies affected
- Windows XP
- Windows Server 2003
- Windows Vista
- Windows Server 2008
- Windows 7
- Windows Server 2008 R2
- Windows 8
- Windows Server 2012
- Windows RT
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Download location for patches:
http://technet.microsoft.com/en-us/security/bulletin/MS13-053
Vulnerability Identifier
- CVE-2013-1300
- CVE-2013-1340
- CVE-2013-1345
- CVE-2013-3129
- CVE-2013-3167
- CVE-2013-3172
- CVE-2013-3173
- CVE-2013-3660
Source
Related Link
Share with