Microsoft Windows Kernel Local Privilege Escalation Vulnerabilities (2880430)

Summary
This host is missing an important security update according to Microsoft Bulletin MS13-101
Impact
Successful exploitation will allow remote attackers to cause a DoS (Denial of Service) and gain escalated privileges. Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/bulletin/ms13-101
Insight
Multiple flaws are due to , - An error within the win32k.sys driver can be exploited to corrupt memory. - A use-after-free error exists within the win32k.sys driver. - An error when processing TrueType font files can be exploited to cause a crash. - A double fetch error exists within the portcls.sys driver. - An integer overflow error exists within the win32k.sys driver.
Affected
Microsoft Windows 8 Windows 8.1 x32/x64 Edition Microsoft Windows Server 2012 Microsoft Windows XP x32 Edition Service Pack 3 and prior Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Detection
Get the vulnerable file version and check appropriate patch is applied or not.
References