Executive Summary
Summary | |
---|---|
Title | Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (971486) |
Informations | |||
---|---|---|---|
Name | MS09-058 | First vendor Publication | 2009-10-13 |
Vendor | Microsoft | Last vendor Modification | 2009-12-09 |
Severity (Vendor) | Important | Revision | 1.1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.1 (December 9, 2009): Added a link to Microsoft Knowledge Base Article 971486 under Known Issues in the Executive Summary.Summary: This security update resolves several privately reported vulnerabilities in the Windows kernel. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logged on to the system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS09-058.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-399 | Resource Management Errors |
33 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
33 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:6264 | |||
Oval ID: | oval:org.mitre.oval:def:6264 | ||
Title: | Windows Kernel NULL Pointer Dereference Vulnerability | ||
Description: | The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold and SP1, and Server 2008 Gold does not properly validate data sent from user mode, which allows local users to gain privileges via a crafted PE .exe file that triggers a NULL pointer dereference during chain traversal, aka "Windows Kernel NULL Pointer Dereference Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-2516 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6506 | |||
Oval ID: | oval:org.mitre.oval:def:6506 | ||
Title: | Windows Kernel Integer Underflow Vulnerability | ||
Description: | Integer underflow in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows local users to gain privileges via a crafted application that triggers an incorrect truncation of a 64-bit integer to a 32-bit integer, aka "Windows Kernel Integer Underflow Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-2515 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6512 | |||
Oval ID: | oval:org.mitre.oval:def:6512 | ||
Title: | Windows Kernel Exception Handler Vulnerability | ||
Description: | The kernel in Microsoft Windows Server 2003 SP2 does not properly handle unspecified exceptions when an error condition occurs, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Exception Handler Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-2517 | Version: | 1 |
Platform(s): | Microsoft Windows Server 2003 | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-14 | Name : Microsoft Windows Kernel Privilege Escalation Vulnerability (971486) File : nvt/secpod_ms09-058.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
58861 | Microsoft Windows Kernel Exception Handler Unspecified Local DoS |
58860 | Microsoft Windows Kernel User Mode PE File Handling NULL Dereference Local Pr... |
58859 | Microsoft Windows Kernel 64-bit Value Conversion Truncation Local Privilege E... |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-10-13 | Name : The Windows kernel is vulnerable to multiple buffer overflow attacks. File : smb_nt_ms09-058.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:46:22 |
|
2013-05-11 00:49:32 |
|