Vigil@nce - Windows: privilege elevation via win32k.sys
January 2013 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can use a vulnerability of the win32k.sys kernel
driver, in order to execute code with system privileges.
Impacted products: Windows 2003, Windows 2008, Microsoft Windows
2012, Windows 7, Windows 8, Windows Vista
Severity: 2/4
Creation date: 08/01/2013
DESCRIPTION OF THE VULNERABILITY
The win32k.sys kernel driver for example manages windows.
However, this driver does not correctly process "window broadcast"
messages. Technical details are unknown.
A local attacker can therefore use a vulnerability of the
win32k.sys kernel driver, in order to execute code with system
privileges.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Windows-privilege-elevation-via-win32k-sys-12313