Skip to main content

Microsoft Windows Kernel Multiple Vulnerabilities

Last Update Date: 13 Jun 2012 15:28 Release Date: 13 Jun 2012 4737 Views

RISK: Medium Risk

TYPE: Operating Systems - Windows OS

TYPE: Windows OS
  1. User Mode Scheduler Memory Corruption Vulnerability
    An elevation of privilege vulnerability exists in the way that the Windows User Mode Scheduler handles system requests. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.
  2. BIOS ROM Corruption Vulnerability
    An elevation of privilege vulnerability exists in the way that Windows handles BIOS memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.

Impact

  • Elevation of Privilege

System / Technologies affected

  • Windows XP Service Pack 3
  • Windows Server 2003 Service Pack 2
  • Windows 7 for x64-based Systems
  • Windows 7 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

 


Vulnerability Identifier


Source

 


Related Link