Skip to main content

Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities

Last Update Date: 13 Apr 2011 18:14 Release Date: 13 Apr 2011 5389 Views

RISK: Medium Risk

TYPE: Operating Systems - Windows OS

TYPE: Windows OS
  1. Win32k Use After Free Vulnerability
    An elevation of privilege vulnerability exists due to the way that Windows Kernel-mode drivers manage kernel-mode driver objects. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

  2. Win32k Null Pointer De-reference Vulnerability
    An elevation of privilege vulnerability exists due to the way that Windows Kernel-mode drivers manage pointers to kernel-mode driver objects. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.