Vulnerability

(MS14-058) Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution (3000061)

Publish date: November 11, 2014

CVE-2014-4113,CVE-2014-4148

SEVERITY

CRITICAL

//  ADVISORY DATE

11 NOV 2014


DESCRIPTION

This bulletin resolves two vulnerabilities in several Windows operating versions. The two vulnerabilities are related to TrueType Font Parsing and kernel-mode driver Win32k.sys. When successfully exploited, attackers can remotely execute code or elevate privilege on the affected computer.

SOLUTION

AFFECTED SOFTWARE AND VERSION

  • Windows Server 2003 Service Pack 2
  • Windows Vista x64 Edition Service Pack 2
  • Windows Server 2008 for x64-based Systems Service Pack 2
  • Windows Server 2008 for Itanium-based Systems Service Pack 2
  • Windows 7 for 32-bit Systems Service Pack 1
  • Windows 7 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
  • Windows 8 for 32-bit Systems
  • Windows 8 for x64-based Systems
  • Windows 8.1 for 32-bit Systems
  • Windows 8.1 for x64-based Systems
  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows RT
  • Windows RT 8.1
  • Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
  • Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
  • Windows Server 2012 (Server Core installation)
  • Windows Server 2012 R2 (Server Core installation)
  • Windows Server 2003 x64 Edition Service Pack 2
  • Windows Server 2003 with SP2 for Itanium-based Systems
  • Windows Vista Service Pack 2
  • Windows Server 2008 for 32-bit Systems Service Pack 2

Featured Stories

Connect with us on