CERT-In Vulnerability Note
CIVN-2011-0191
Microsoft Windows Kernel Exception Handler Privilege Escalation Vulnerability
Original Issue Date:December 14, 2011
Severity Rating: HIGH
Systems Affected
- Windows XP SP3
- Windows Server 2003 SP2
- Windows Vista SP2
- Windows Server 2008 for 32-bit Systems SP2 [Server Core installation not affected]
- Windows 7 for 32-bit Systems SP1 and prior
Overview
A vulnerability has been reported in Microsoft Windows, which could be exploited by malicious, local users to gain escalated privileges.
Description
The vulnerability is caused due to improper handling of uninitialized objects within certain exception handlers in the kernel. A local attacker could exploit this vulnerability to execute arbitrary code on the local system with kernel-mode privileges, resulting in a complete system compromise.
Solution
Apply appropriate updates as mentioned in the Microsoft Security Bulletin
MS11-098
Vendor Information
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/ms11-098
References
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/ms11-098
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=24713
SecurityTracker
http://securitytracker.com/id/1026415
Secunia
http://secunia.com/advisories/47204/
CVE Name
CVE-2011-2018
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|