Hi
Can Microsoft please check on these issues.
It seems that the vulnerability did not patch this issues.
Microsoft Windows Kernel "win32k.sys" Privilege Escalation Vulnerability
Secunia Advisory SA53435
Where:
Local system
Impact:
Privilege escalation, DoS
Solution Status:
Unpatched
Operating System:
![](http://www.secunia.com/img/comment_small_off.png)
![](http://www.secunia.com/img/comment_small_off.png)
CVE Reference(s):
Description
Tavis Ormandy has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges
The vulnerability is caused due to an error within "win32k.sys" when processing certain objects and can be exploited to cause a crash or execute arbitrary code with the kernel privilege.
The vulnerability is confirmed on a fully patched Windows 7 x86 Professional (win32k.sys version 6.1.7601.18126) and reported on Windows 8. Other versions may also be affected.
Solution:
No official solution is currently available.
Provided and/or discovered by:
Tavis Ormandy
Original Advisory:
http://seclists.org/fulldisclosure/2013/May/91
http://packetstormsecurity.com/files/121851/Windows-NT-2K-XP-2K3-VISTA-2K8-7-8-EPATHOBJ-Local-ring0.html
Deep Links:
Links
available to Secunia VIM customers