Windows kernel overflow vulnerability found

An insecurity researcher from Tel Aviv who goes by the nickname "arkon", has uncovered a heap overflow vulnerability lurking in the Windows kernel.

Arkon, whose real name is Gil Dabah, posted a proof-of-concept to demonstrate the bug on his website RageStorm.net.

A further alert appeared on Secunia's pages, which reports that Microsoft is investigating the matter

"Upon completion of the investigation, Microsoft will take appropriate actions to protect customers," Microsoft spokesman Jerry Bryant said.

According to Secunia, attackers could use the bug in the Win32k.sys kernel-mode device driver using the GetClipboardData API.

So ,if you're a wannabe attacker now you know.

"Successful exploitation may allow execution of arbitrary code with kernel privileges," Secunia says.

The vulnerability is confirmed in fully patched versions of Windows XP SP3, Windows Server 2003 R2 Enterprise SP2, Windows Vista Business SP1, Windows 7, and Windows Server 2008 SP2.

Google employee and Microsoft basher Tavis Ormandy twitted: "I don't think there's been more than a few days this year that Microsoft [hasn't] been vulnerable to public kernel flaws."

Microsoft is set up issue a bumper update issue tomorrow, fixing at least 14 holes in Windows. This latest is unlikely to be among them

Meanwhile, Secunia suggests only letting people you trust fiddle with your PC.