Secunia Advisory SA38265Microsoft Windows Two Privilege Escalation Vulnerabilities
|
||||
Description
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. 1) An error exists within the #GP trap handler (nt!KiTrap0D), which can be exploited to execute arbitrary code with kernel privileges. NOTE: 64-bit Microsoft Windows operating systems and Windows Server 2008 R2 for x64- and Itanium-based systems are not affected. 2) An error exists due to the Windows kernel not correctly resetting a pointer when freeing memory, which can be exploited to trigger a double-free condition. Successful exploitation of this vulnerability allows arbitrary code execution with system level privileges. Solution Provided and/or discovered by Deep Links Discuss this advisoryA new thread in our forum is automatically created for each posted Secunia Advisory. Activate the thread by commenting/discussing below.
|
||||