Microsoft Windows Kernel Multiple Vulnerabilities
Last Update Date:
13 Jun 2012 15:28
Release Date:
13 Jun 2012
4737
Views
RISK: Medium Risk
TYPE: Operating Systems - Windows OS
- User Mode Scheduler Memory Corruption Vulnerability
An elevation of privilege vulnerability exists in the way that the Windows User Mode Scheduler handles system requests. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. - BIOS ROM Corruption Vulnerability
An elevation of privilege vulnerability exists in the way that Windows handles BIOS memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.
Impact
- Elevation of Privilege
System / Technologies affected
- Windows XP Service Pack 3
- Windows Server 2003 Service Pack 2
- Windows 7 for x64-based Systems
- Windows 7 for x64-based Systems Service Pack 1
- Windows Server 2008 R2 for x64-based Systems
- Windows Server 2008 R2 for x64-based Systems Service Pack 1
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Download location for patches:
http://technet.microsoft.com/en-us/security/bulletin/ms12-042
Vulnerability Identifier
Source
Related Link
Share with