MS Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2870008)

Summary
This host is missing an critical security update according to Microsoft Bulletin MS13-081
Impact
Successful exploitation will allow remote attackers to execute arbitrary code with kernel-mode privileges and take complete control of the affected system. Impact Level: System
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, https://technet.microsoft.com/en-us/security/bulletin/ms13-081
Insight
Multiple flaws are due to , - An error when parsing OpenType fonts (OTF) can be exploited to corrupt memory. - An error when handling the USB descriptor of inserted USB devices can be exploited to corrupt memory. - A use-after-free error within the kernel-mode driver (win32k.sys) can be exploited to gain escalated privileges. - An error when handling objects in memory related to App Containers can be exploited to disclose information from a different App Container. - An error related to NULL page handling within the kernel-mode driver (win32k.sys) can be exploited to gain escalated privileges. - A double fetch error within the DirectX graphics kernel subsystem (dxgkrnl.sys) can be exploited to gain escalated privileges. - An error when parsing the CMAP table while rendering TrueType fonts (TTF) can be exploited to corrupt memory.
Affected
Microsoft Windows 8 Microsoft Windows Server 2012 Microsoft Windows XP x32 Edition Service Pack 3 and prior Microsoft Windows XP x64 Edition Service Pack 2 and prior Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior
Detection
Get the vulnerable file version and check appropriate patch is applied or not.
References