MS12-041: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2709162)

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

The remote Windows host is affected by multiple privilege escalation
vulnerabilities.

Description :

The remote Windows host is affected by several vulnerabilities in the
Kernel-Mode drivers that could allow elevation of privilege :

- Flaws in the way the Windows kernel-mode drivers manage
driver objects could be exploited to execute arbitrary
code in kernel mode. (CVE-2012-1864, CVE-2012-1865,
CVE-2012-1866)

- Windows kernel-mode drivers do not properly allocate
memory when handling fonts, which could be exploited to
execute arbitrary code in kernel mode. (CVE-2012-1867)

- A race condition exists in the way that the kernel deals
with specific thread creation attempts. This could be
exploited to execute arbitrary code in kernel mode.
(CVE-2012-1868)

See also :

http://technet.microsoft.com/en-us/security/bulletin/ms12-041

Solution :

Microsoft has released a set of patches for Windows XP, 2003, Vista,
2008, 7, and 2008 R2.

Risk factor :

High / CVSS Base Score : 8.5
(CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 59459 ()

Bugtraq ID: 53815
53816
53817
53819
53820

CVE ID: CVE-2012-1864
CVE-2012-1865
CVE-2012-1866
CVE-2012-1867
CVE-2012-1868