The kernel-mode drivers in Microsoft Windows XP SP3 do not properly perform indexing of a function-pointer table during the loading of keyboard layouts from disk, which allows local users to gain privileges via a crafted application, as demonstrated in the wild in July 2010 by the Stuxnet worm, aka "Win32k Keyboard Layout Vulnerability." NOTE: this might be a duplicate of CVE-2010-3888 or CVE-2010-3889.
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-073
- https://github.com/Kuromesi/Py4CSKG
- https://github.com/Reakt0rPhantom/Stuxnet-Rootkit
- https://github.com/ring0-c0d3-br34k3r/Stuxnet-Rootkit
- https://github.com/whoami-a51/stuxnet-info
- https://github.com/x86byte/Stuxnet-Rootkit