A vulnerability in the Microsoft Windows Win32k kernel-mode driver could allow a local malicious user to escalate privileges on a targeted system.The vulnerability is due to improper memory operations that are performed by the affected software. An attacker could exploit this vulnerability by accessing the system and executing an application that submits malicious input to the affected software. A successful exploit could allow the malicious user to execute arbitrary code in kernel mode and compromise the system completely.Microsoft confirmed the vulnerability and released software updates.
This month the vendor has patched 74 vulnerabilities, 20 of which are rated Critical.
Posted: 13 Feb, 201922 Min ReadThreat Intelligence SubscribeFollowtwitterfacebooklinkedinMicrosoft Patch Tuesday – February 2019This month the vendor has patched 74 vulnerabilities, 20 of which are rated Critical.As always, customers are advised to follow these security best practices:
Install vendor patches as soon as they are available.
Run all software with the least privileges required while still maintaini...