-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.0192
         Vulnerabilities in Windows Kernel-Mode Driver Could Allow
                     Elevation of Privilege (2778344)
                             13 February 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Microsoft Windows
Publisher:         Microsoft
Operating System:  Windows
Impact/Access:     Increased Privileges -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-1277 CVE-2013-1276 CVE-2013-1275
                   CVE-2013-1274 CVE-2013-1273 CVE-2013-1272
                   CVE-2013-1271 CVE-2013-1270 CVE-2013-1269
                   CVE-2013-1268 CVE-2013-1267 CVE-2013-1266
                   CVE-2013-1265 CVE-2013-1264 CVE-2013-1263
                   CVE-2013-1262 CVE-2013-1261 CVE-2013-1260
                   CVE-2013-1259 CVE-2013-1258 CVE-2013-1257
                   CVE-2013-1256 CVE-2013-1255 CVE-2013-1254
                   CVE-2013-1253 CVE-2013-1252 CVE-2013-1251
                   CVE-2013-1250 CVE-2013-1249 CVE-2013-1248

Original Bulletin: 
   http://technet.microsoft.com/en-us/security/bulletin/MS13-016

- --------------------------BEGIN INCLUDED TEXT--------------------

Microsoft Security Bulletin MS13-016 - Important

Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of 
Privilege (2778344)

Published Date: February 12, 2013

Version: 1.0

General Information

Executive Summary

This security update resolves 30 privately reported vulnerabilities in 
Microsoft Windows. The vulnerabilities could allow elevation of privilege if
an attacker logs on to the system and runs a specially crafted application. An
attacker must have valid logon credentials and be able to log on locally to 
exploit the vulnerabilities.

This security update is rated Important for all supported releases of 
Microsoft Windows except Windows 8, Windows Server 2012, and Windows RT.

Affected Software

Windows XP Service Pack 3 (KB2799494)
Windows XP Professional x64 Edition Service Pack 2 (KB2799494)
Windows Server 2003 Service Pack 2 (KB2799494)
Windows Server 2003 x64 Edition Service Pack 2 (KB2799494)
Windows Server 2003 with SP2 for Itanium-based Systems (KB2799494)
Windows Vista Service Pack 2 (KB2799494)
Windows Vista x64 Edition Service Pack 2 (KB 2799494)
Windows Server 2008 for 32-bit Systems Service Pack 2 (KB2799494)
Windows Server 2008 for x64-based Systems Service Pack 2 (KB2799494)
Windows Server 2008 for Itanium-based Systems Service Pack 2 (KB2799494)
Windows 7 for 32-bit Systems (KB2799494)
Windows 7 for 32-bit Systems Service Pack 1 (KB2799494)
Windows 7 for x64-based Systems (KB2799494)
Windows 7 for x64-based Systems Service Pack 1 (KB2799494)
Windows Server 2008 R2 for x64-based Systems (KB2799494)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (KB2799494) 
Windows Server 2008 R2 for Itanium-based Systems (KB2799494)
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 (KB2799494)
Windows 8 for 32-bit Systems (KB2799494)
Windows 8 for 64-bit Systems (KB2799494)
Windows Server 2012 (KB2799494)
Windows RT (KB2799494
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core 
installation) (KB2799494)
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core 
installation) (KB2799494)
Windows Server 2008 R2 for x64-based Systems (Server Core installation) 
(KB2799494)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core 
installation) (KB2799494)
Windows Server 2012 (Server Core installation) (KB2799494)

Vulnerability Information

Win32k Race Condition Vulnerabilities
 
Elevation of privilege vulnerabilities exist when the Windows kernel-mode
driver improperly handles objects in memory. An attacker who successfully 
exploited these vulnerabilities could gain elevated privileges and read 
arbitrary amounts of kernel memory.

To view these vulnerabilities as standard entries in the Common 
Vulnerabilities and Exposures list, see the following:

CVE-2013-1248
CVE-2013-1249
CVE-2013-1250
CVE-2013-1251
CVE-2013-1252
CVE-2013-1253
CVE-2013-1254
CVE-2013-1255
CVE-2013-1256
CVE-2013-1257
CVE-2013-1258
CVE-2013-1259
CVE-2013-1260
CVE-2013-1261
CVE-2013-1262
CVE-2013-1263
CVE-2013-1264
CVE-2013-1265
CVE-2013-1266
CVE-2013-1267
CVE-2013-1268
CVE-2013-1269
CVE-2013-1270
CVE-2013-1271
CVE-2013-1272
CVE-2013-1273
CVE-2013-1274
CVE-2013-1275
CVE-2013-1276
CVE-2013-1277

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=DQ7/
-----END PGP SIGNATURE-----