Release date:
Updated on:
Affected Systems:
FreeBSD 8.2
FreeBSD 8.1
FreeBSD 7.4
NetBSD netbsd5.1
NetBSD netbsd5.0
NetBSD netbsd4.1
NetBSD netbsd4.0
XenSource Xen 4.1.2
XenSource Xen 4.1.1
XenSource Xen 4.0
Microsoft Windows 7 Microsoft Windows 7 for x64-ba
Microsoft Windows 7 Microsoft Windows 7 for x64-ba
Description:
--------------------------------------------------------------------------------
Bugtraq id: 53856
Cve id: CVE-2012-0217
Intel is the world's largest chip manufacturer and a leading manufacturer of computer, network and communication products.
On Intel x64 platform, Microsoft Windows Server 2008 R2 and R2 SP1, as well as the user status scheduler in Windows 7 Gold and SP1 kernel did not properly process system requests, and there was a memory corruption vulnerability in implementation, allows local users to obtain elevation permissions through special applications, and execute arbitrary code with the minimum privilege.
<* Source: Rafal Wojtczuk
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Microsoft
---------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.microsoft.com/technet/security/